kabir Profile picture
May 9 7 tweets 2 min read
Continue...

Bug Bounty Checklist for Web App - Part - 2

Risky Functionality - File Uploads:
- Test that acceptable file types are whitelisted
- Test that file size limits, upload frequency and total file counts are defined and are enforced
- Test that file contents match the defined file type
- Test that all file uploads have Anti-Virus scanning in-place.
- Test that unsafe filenames are sanitised
- Test that uploaded files are not directly accessible within the web root
- Test that uploaded files are not served on the same hostname/port
- Test that files and other media are integrated with the authentication and authorisation schemas
Risky Functionality - Card Payment:
- Test for known vulnerabilities and configuration issues on Web Server and Web Application
- Test for default or guessable password
- Test for non-production data in live environment, and vice-versa
- Test for Injection vulnerabilities
- Test for Buffer Overflows
- Test for Insecure Cryptographic Storage
- Test for Insufficient Transport Layer Protection
- Test for Improper Error Handling
- Test for all vulnerabilities with a CVSS v2 score > 4.0
- Test for Authentication and Authorization issues
- Test for CSRF
HTML 5:
- Test Web Messaging
- Test for Web Storage SQL injection
- Check CORS implementation
- Check Offline Web Application
Thank you for reading 🚀

If you find this thread useful🎯
- You can Like the First Tweet
- Help others to find it by Retweeting
- Follow @kabir0x23 for more content like this

- #100DaysOfHacking 📒Notes 👇
- Give a Star⭐ and Follow on 🐙
github.com/kabir0x23/100D…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with kabir

kabir Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @kabir0x23

May 9
Bug Bounty Checklist for Web App
Source: ~@owasp

Recon on wildcard domain:

- Run amass
- Run subfinder
- Run assetfinder
- Run dnsgen
- Run massdns
- Use httprobe
- Run aquatone (screenshot for alive host)
Single Domain:

Scanning:
- Nmap scan
- Burp crawler
- ffuf (directory and file fuzzing)
- hakrawler/gau/paramspider
- Linkfinder
- Url with Android application
Manual checking:
- Shodan
- Censys
- Google dorks
- Pastebin
- Github
- OSINT
Read 24 tweets
Jan 20
Golden Tips + Resources To get Job/Internships + For self Development

Only these Best Resources you need to start 📈
Opensource, Web Development, Programming, DevOps and all Cyber Security Resources Included ⬇
🧵🔥
[ Open-source ]
Open Source Plays Important role in Self Development + in Job/Internships resume.

What is Open Source & How to Start?
by @kunalstwt

25+ Paid Open Source Programs and Internships
by @kunalstwt
Best Open Source Guidance Channel + My Fav Channel On youtube

youtube.com/c/eddiejaoude/… by @eddiejaoude

Website: eddiehub.org
Read 27 tweets
Jan 19
- #100DaysOfHacking with
- 📒Notes (included in the last).
- Day - 4
- Viewing Creating Editing Files.
1. print the "hello"
┌──(root💀kali)-[~/twt]
└─ echo "hello"
>> hello
2. Save "hello" into the files
┌──(root💀kali)-[~/twt]
└─ echo "hey" > hey.txt

┌──(root💀kali)-[~/twt]
└─ cat hey.txt
Read 7 tweets
Jan 18
- #100DaysOfHacking with
- 📒 Notes (included in the last).
- Day - 3 (must checkout)
- 2. File Permission-modifications (in detail). ⬇
File permissions can be viewed using the `ls` command.
Here is an example:

┌──(root💀kali)-[~/twt]
└─ # ls -l filename.txt Image
The write, read, and execute permissions have the following number value: Image
Read 6 tweets
Jan 18
- #100DaysOfHacking with 📒Notes (included in the end).
- Day - 3
- 1. Users and Privileges. ⬇
~# ls -la
List for checking permissions ⬇ Image
`d` - directory
`-` - file Image
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(