• Bug Bounty Hunting Tip #1- Always read the Source Code
How To Approach a Target - Thread🧵:👇
Approach a Target (Lot of this section is taken from
Jason Haddix and portswigger blog)
• Ideally you wants to choose a program that has a wide scope. You’re also going to be wanting to look for a bounty program that has wider range of vulnerabilities within scope.
• Mining information about the domains, email servers and social network connections.
—————————
I've opened My Bug Bounty tips Group =>
Join Link : t.me/bugbountyresou…
—————————
It occur when application provides direct access to objects based on user-supplied input. Attackers can bypass authorization and access resources in the system directly
After input "xxxxxxxxxxxxxx" as a value of param1, check your cookies. If there is cookies the value is "xxxxxxxxxxxxxxxxxxxxxx" it means the website is vulnerable
🏹Try input a very long payload to form. For example using very long password or using very long email
. . .