It is Wednesday my dudes, so that means it's time for #BugBytes 182! Your weekly round up of all things Bug Bounty
Let's get into it 🧵 1/11
1⃣ Trade deal: We provide you our top resources from this weeks bug bytes, you reply to our survey telling us what you think of Bug Bytes 2/11 forms.office.com/r/ReW4bs0FXk
2⃣ How do you do fellow kids, did you know we have a Mastodon account? We're on infosec exchange, here's the link to follow us 3/11 infosec.exchange/@Intigriti
4⃣ such tool, much discovery, wow @pdiscoveryio launches katana a new tool which offers some great crawling and spidering to add to your toolbox 5/11 github.com/projectdiscove…
5⃣ Hello There, @gregxsunday shares some tips for increasing the impact of findings for bigger bounties 6/11
6⃣ @samwcyo and the boys formed a small group of hackers and in 10 days they found 100 bugs, with 50 critical findings! 7/11
8⃣ stonks @PortSwigger is running a Burp Challenge, solve 4 challenges by the 31st of December to win swag and a Burp Suite Certified Practitioner exam credit 9/11 portswigger.net/web-security/c…
Google knows everything about your target. Google Dorking is using the search engine to find juicy stuff!
Here are some quick examples to show you the POWER of dorks 👇
[1️⃣] Recon through copyright
A lot of targets have a copyright string they include on every site they manage. Let's find new assets by seeing if Google knows of any more pages that have that copyright!
[2️⃣] Login pages
Let's say you've found some credentials for your target, but you don't know where to use them. Fret no more! This Google dork will help you find all login pages on your target's domain!
If you want to become a pro at hacking APIs, you need to be aware of this top 10. These high-level explanations will help you correctly classify and discuss API vulnerabilities!
[2️⃣] Exploiting e-mail systems by @securinti 📧
Did you know you can exploit an SQL injection using an e-mail address? Neither do developers!
And it's not just SQLi! Find out more 👇
[1️⃣] CSRF?
If we can post notes as our victim, that would open up some possibilities to achieve XSS, so let's look into this.
Is it really that easy? Find out! 👇
Recon, the gathering of information about your target, is becoming more and more important! 🧠
Here are the tools to help you spot subdomains, vhosts, S3 buckets, parameters and more faster and more effective than the others 👇
[1️⃣] DNS
This DNS toolkit by @pdiscoveryio can do a lot! But let's focus on reverse DNS lookups 👀
Often, you have a huge list of IP addresses 📜
Just like resolving a domain to an IP, you can also try doing the opposite using PTR records!
Et voila! Domains to continue recon! 👇
[2️⃣] Amass
This network mapping tool by @owasp is incredible, but let's hone in on doing subdomain enumeration. 🕸
The main domains companies use are often well-secured. But what about the domain that nobody knows about? Those can be riddled with bugs! 🐛
Let's find them! 👇
🔴LIVE MENTOR SESSION (starting now): @zseano
will answer your questions for the next 4 hours!
💬 Comment with your question! 👇
@Devil79830787 wants to know: "How can a complete noob (non-techie) enter the world of bug bounty(or hacking) in 2021. Top resources techniques and where to start and how to start advices"
@zseano@waters_ro asked: "What’s the bug you’ll never forget and why?"