[2οΈβ£] Exploiting e-mail systems by @securinti π§
Did you know you can exploit an SQL injection using an e-mail address? Neither do developers!
And it's not just SQLi! Find out more π
[3οΈβ£] Automating blind XSS by @abdlah_md
Payloads can pop up anywhere! What if a target logs User-Agents in a vulnerable application?
Let's use @Burp_Suite to make sure we always have a payload as our User-Agent π
[4οΈβ£] Don't overcomplicate by @G0053me
Don't just barge into applications with crazy payloads. Take a more methodological approach!
Find entry points by pasting <u>123</u> anywhere you can, for example! π
[5οΈβ£] Localhost by @hacker_
The developers will never expect you to come from the inside!
Make the target think you belong there, and see if the results from your scans differ! π
[6οΈβ£] Premium Burp speeds by @InsiderPhD
Can't afford @Burp_Suite Pro right now? Don't worry!
Combine the speed of Ffuf and the utility of Burp for free π
[7οΈβ£] Server-side HTML injections by @harshbothra_
HTML injections on the server side can be incredibly powerful! π
See how you can use an iFrame to get AWS metadata π
[9οΈβ£] Googling IPs by @0x21SAFE @Google becomes even more powerful! This is your chance to find assets by ensuring Google only returns IP addresses! π
[1οΈβ£0οΈβ£] XXE by @mr_hacker0007
Are any XXE lovers here? Thoroughly test XXE parsers and SVG renderers by checking if 'xinclude' is supported β
Easy LFI or SSRF? π
[1οΈβ£1οΈβ£] Hidden parameters by @hakluke
Parameters can be hidden everywhere!
Variables can be a great source to uncover some GET/POST parameters! π
[1οΈβ£2οΈβ£] Leaking APKs by @_superhero1
You're not a mobile hunter, YET! Take your first steps in becoming one by scanning APKs for secrets using APKLeaks! π
But what if somebody else could read your notes?π
[1οΈβ£] CSRF?
If we can post notes as our victim, that would open up some possibilities to achieve XSS, so let's look into this.
Is it really that easy? Find out! π
Recon, the gathering of information about your target, is becoming more and more important! π§
Here are the tools to help you spot subdomains, vhosts, S3 buckets, parameters and more faster and more effective than the others π
[1οΈβ£] DNS
This DNS toolkit by @pdiscoveryio can do a lot! But let's focus on reverse DNS lookups π
Often, you have a huge list of IP addresses π
Just like resolving a domain to an IP, you can also try doing the opposite using PTR records!
Et voila! Domains to continue recon! π
[2οΈβ£] Amass
This network mapping tool by @owasp is incredible, but let's hone in on doing subdomain enumeration. πΈ
The main domains companies use are often well-secured. But what about the domain that nobody knows about? Those can be riddled with bugs! π
Let's find them! π
π΄LIVE MENTOR SESSION (starting now): @zseano
will answer your questions for the next 4 hours!
π¬ Comment with your question! π
@Devil79830787 wants to know: "How can a complete noob (non-techie) enter the world of bug bounty(or hacking) in 2021. Top resources techniques and where to start and how to start advices"
@zseano@waters_ro asked: "Whatβs the bug youβll never forget and why?"
π΄LIVE MENTOR SESSION: @Agarri_FR will answer your questions for the next 4 hours!
π¬ Comment with your question! π
Question from @aroly:
"What are the features you look at when searching for SSRF ? The places where you look first ?"
Question from @aroly:
"What do you try with external blind SSRF ? For example you can trigger a GET to the URL of the HTTP "Referer" header but that's it... What do you do in such situation ?"