ShreKy Profile picture
Oct 18 β€’ 9 tweets β€’ 4 min read
Bug Testing Methodology Series:

𝐁𝐀𝐂 (𝐁𝐫𝐨𝐀𝐞𝐧 π€πœπœπžπ¬π¬ 𝐂𝐨𝐧𝐭𝐫𝐨π₯)

Learn how to test for Broken Access Control step by step on real #bugbounty programs.

ThreadπŸ§΅πŸ‘‡

#cybersecurity #cybersecuritytips #infosec #hacking #bugbountytips #infosecurity
Before we start, this thread will not teach exactly how Broken Access Control vulnerabilities arise, but rather a testing methodology.

If you want to learn how BAC bugs work, check this out ➑️ portswigger.net/web-security/a…
1️⃣ Know your target

In order to know what which user role can do, you have to know your target well.

If documentations are available, make full use of them, if not, use the app as much as you can from the perspective of each user role (have a different account for each role)
2️⃣ Test plan

Obviously, you need to have multiple accounts, one for each available user role.

If you're using Chrome, use multiple profiles for each account, and for Firefox, use this extension --> addons.mozilla.org/en-US/firefox/…

This is the same when testing for IDORs too.
3️⃣ Testing

The premises of BAC testing is lateral and vertical privilege escalation, seeing if user role A can do what B can, even though he's not supposed to. If he can, then we have a bug.

This consists in replacing cookies/tokens on various requests, such as API calls.
For example:
/api/admin/users (Admin only)
Try to access it with Normal user privileges

To remove the pain of copy-pasting cookies/tokens/keys for 100 times, use the extension Authorize in Burp Suite.

If the attack fails(as expected), you can try tweak the request in somd ways.
Try changing request methods, adding/removing params, tokens, headers, etc

Tamper with the URL, inject certain parameters, change some values, JSON ➑️ Normal params, force browsing, WHATEVER you can think of.

Fool the system by making it think you have access to that resource.
If all fails, move on to the next function.

There's not that many bypasses you can try, if the privileges for your users don't allow for a certain thing, don't spend more than 5 minutes trying to bypass it.

There's a lot of other requests for you to test so don't waste time.
That's a wrap!

If you enjoyed this thread:

1. Follow me @shrekysec for more of these
2. RT the tweet below to share this thread with your audience

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with ShreKy

ShreKy Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @shrekysec

Oct 13
#BugBounty Writeup Time⏰

Application DOS through unfinished image contents:
πŸ§΅πŸ‘‡

#bugbountytips #infosec #cybersecurity #cybersecuritytips #hacking #bugbountytip
Context about target:

Small blockchain platform allowing users to launch and contribute to projects.

Projects can contain a banner image, and this is where the bug resides.

This is gonna be a short one.
When uploading an image for the project, it sent a POST request with an "image" WebKitFormBoundary parameter, which contained the image contents.

After some XSS testing, I came across that removing the last line of the image contents resulted in weird behavior.
Read 6 tweets
Oct 5
Bug Testing Methodology Series:

𝐗𝐒𝐒 (𝐂𝐫𝐨𝐬𝐬 π’π’π­πž π’πœπ«π’π©π­π’π§π )

Learn how to test for #XSS step by step on real #bugbounty programs.

ThreadπŸ§΅πŸ‘‡

#cybersecurity #cybersecuritytips #infosec #hacking #bugbountytips #infosecurity
Before we start, it should be mentioned that this thread will only focus on the testing methodology of XSS, not teaching how it works.

If you don't already know what XSS is, check this out ➑️ portswigger.net/web-security/c…
1️⃣ Look for reflections

This is the first step in finding XSS.

Anywhere you see user input is reflected in the response (not limited to what you see on the page, it could be in source code/HTTP response only), note the location/parameter down, that's a potential attack vector.
Read 10 tweets
Oct 4
1️⃣ IT Fundamentals

Before jumping into more advanced fields, you gotta know the basics.

You can learn everything you need for FREE from
@ProfessorMesser's course ➑️ professormesser.com/free-a-plus-tr…

For reference, you should be apt for @CompTIA's A+ certification before the next step.
2️⃣ Networking

It's time to get technical.

Networking will teach you how the internet works, and it's CRUCIAL to have a SOLID understanding of this subejct.

You don't have to be a network engineer, but know things like the OSI Model, TCP/IP, Ports & Services, CIDR, Subnets, etc
Read 18 tweets
Sep 30
I gained FULL ADMIN access to other organizations.

The craziest #bugbounty I've found.

WriteupπŸ§΅πŸ‘‡

#bugbountytips #infosec #cybersecurity #cybersecuritytips
First of all, I should give a little context about the target:

The target consisted of a collaboration tool for organizations/teams.

There are multiple user roles --> Member, Admin, Moderator, Leader.

It allows organizations to communicate with each other, create teams, etc.
Now onto the findings:

This impact was a result of a 3 bug chain.

Info disclosure --> IDOR --> IDOR --> Full Admin Access to other organizations

Let's dive deeper into each bug chain:
Read 13 tweets
Sep 27
Want to learn #coding in 2022?

Here are the BEST FREE/PAID resources for you to learn as FAST as possible.

Thread🧡

#programming #IT #cybersecurity #code #infosec #python #java #javascript #web
βœ‹Before we start, make sure to RT the first tweet to spread these tips with others.
First off, you need to decide what language(s) to learn.

Below is a list of the most popular languages to help you decide which one is best for you:
(source: dzone.com/articles/top-1…) Image
Read 14 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(