Hossein NafisiAsl Profile picture
May 12 ā€¢ 8 tweets ā€¢ 4 min read
How We hacked Admin Panel just by JS file:
(step by step)
#bugbounty #bugbountytips

šŸ§µšŸ‘‡šŸ»
1/ Introduction šŸ“–

Team gave mobile app and website.

We didnā€™t waste of time on mobile app and decided to work on website.

We just tried to find Admin Panel because main domain was just a single page to download the app.
2/ Subdomain Enumeration šŸ”Ž

After brute forcing the subdomains we found that website had a subdomain like that admin.target.com

When we visited the subdomain we just got that Login Portal
3/ Some Techniques but Nothing ā›”ļø

a) Couldnā€™t brute force the password (Too Many request)

b) Directory fuzzing not result.

c) There wasnā€™t any sign up form to try some bypass ways.

d) The website was new so there was not any related URLs/info about it.

So what we can do now?
4/ Source Code Review šŸ’”

Taking a look at the source code is a nice part of finding bugs!

When we took a look at page there was just one line that was deserve to focus on

and that was a JS file.
5/ Source Code Review šŸ”

After opening JS file, First we searched for sensitive words such as:
admin, config, password, token, email, .conf

Happily when we tried token we found this juicy piece of code:
6/ Get bounty šŸ¤‘

According to end URL part (addAdmin.php) we knew that this is a POST request that will create another admin account.

So we sent a POST request and response is OK

We had full control of Panel and successfully hacked it and got $$$ reward for it.
7/
How We hacked Admin Panel by JS file
By 'Zhenwar Hawlery'
github.com/NafisiAslH/Knoā€¦

ā€¢ ā€¢ ā€¢

Missing some Tweet in this thread? You can try to force a refresh
怀

Keep Current with Hossein NafisiAsl

Hossein NafisiAsl Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @MeAsHacker_HNA

May 11
Have you ever get bounty by using default credentials?
Read this thread šŸ”„

#bugbountytips
šŸ§µšŸ‘‡šŸ»
You need to have a special word list for each vendor.

This thread has most known vendors default credentials that gathered from several sources.

Default Credentials for Apache Tomcat:
2/
Default Credentials for Cisco
Read 8 tweets
Mar 9
1/

R3C0Nizer is the first ever CLI based menu-driven automated web application B-Tier recon framework ...
github.com/Anon-Artist/R3ā€¦

#Recon #BugBounty
#100BugBountySecrets
šŸ§µšŸ‘‡
2/

scant3r is a module-based web security tool, our goal is to make customizable tool with providing many functions and features that what you need for write a security module....
github.com/knassar702/scaā€¦

#Recon #BugBounty
#100BugBountySecrets
šŸ§µšŸ‘‡
Read 11 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(