Nagli Profile picture
Feb 3, 2023 7 tweets 3 min read Read on X
Recently, I faced numerous challenges where I needed to bypass limited SSRF or overcome regex mitigations to increase impact and make a case for a report.

Spinning up a server to host a redirection header is time consuming and not-so-fun to do.

There's an easy alternative 🧵
While exploring some options online I've came across replit.com, their product offers a pretty easy way to just spin up a server with whatever technologies you'd like, and control the files and source code of your application.

#NotSponsored
So, as easy as it gets - we will select a PHP Server to host our payload on, change the index.php file to have the following code snippet:

<?php
// PHP permanent URL redirection test
header("Location: http://internal.asset", true, 307);
exit();
?>
Then on the top right corner we'll have our constructed URL to test our payload on the target, should be something like *.repl.co

So in a matter of ~2 minutes - we have our own DNS name with a redirection payload that we can point directly to internal assets of our target, cool!
After testing our payload on our injection point,

We can observe the interactive console on the bottom right of the page, and debug the information to wether we managed to successfully increase our SSRF Impact and to determine that everything is set up correctly.
This is mostly useful for SSRF endpoints with heavy whitelisting / regex mitigations, if the SSRF will follow redirects, that could open a whole new aspect for numerous of chains to bypass those.

It helped me to successfully hit internal assets at the H1-407 Live Hacking Event.
TLDR:
Hosting a redirection machine for whitelisting bypass scenarios should take no longer than 2 minutes

1. Create repl.it server with any technology
2. Edit the source code
3. Use the constructed DNS Payload on your target
4. Debug
5. Win

#BugBountyTips

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Nagli

Nagli Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @galnagli

Feb 2
I gained complete access to @moltbook's database -The AI Agents Social Network - in under 3 minutes.

API keys of every agent. Over 25k email addresses. Private agent-to-agent DMs, and full write access.

Simply by browsing like a normal user.

Here's what happened 🧵 Image
@moltbook The mega weekend hype about the platform got me curious to see how it worked, especially the following tweets from @karpathy and others calling it "genuinely the most incredible sci-fi takeoff-adjacent thing"

@moltbook @karpathy I set up @openclaw via telegram, signed up to @moltbook and already got super scared that my agent will post my keys over the platform - so I just took the API Keys from the credentials file on the machine and deleted my agent machine to experiment further Image
Read 19 tweets
Jan 22
Introducing my Bug Bounty Masterclass. 100% free.

I've made $2,000,000+ finding security bugs. I spent the last year turning my methodology into a complete blueprint.

4 hours of video - foundations, reconnaissance, web proxies, hands-on challenges, and certification.

Finish it in a weekend and start hacking real-world applications 🐞
Excited to see what bugs you all are going to find!

wiz.io/bug-bounty-mas…Image
The course is split to 5 main chapters that could guide anyone from 0 to finding their first bug, 100% guaranteed! especially if you augment yourself with Agents like @claudeai Claude code :) Image
Read 4 tweets
Oct 22, 2025
We found a way to access Max Verstappen's passport, driver's license, and personal information. Along with every other @Formula1 driver's sensitive data.

It took us 10 minutes using one simple security flaw 🧵 Image
Together with @samwcyo and @iangcarroll - all 3 of us being avid Formula1 Fans, we were looking at the security of the whole ecosystem.

That's how we stumbled upon a severe vulnerability in a critical portal managed by the @fia, that was reported and fixed in <24 hours. Image
To race in F1, drivers need an FIA Super Licence - the golden ticket of motorsport.

The @fia (@F1 1's governing body) also categorizes drivers as Bronze/Silver/Gold/Platinum for other racing events.
This is managed through a web portal - driverscategorisation.fia.comImage
Read 16 tweets
Jul 29, 2025
I hacked a popular vibe coding platform with a simple, straight-forward logic flaw - allowing access to private applications . Here’s how I did it 🧵 Image
As Vibe Coding Platforms are on the rise, I was intrigued with the question on how secure they really are, targeting @base_44 which was recently acquired by @Wix allowed me to access private applications of enterprises trusting their platform.
The external attack surface of the Vibe Coding platform is relatively small, we basically have:

1. The marketing website - base44.com
2. The main application - app.base44.com
3. The public docs - docs.base44.com

So I didn't expect to find much from an unauthenticated perspective...Image
Read 13 tweets
Jan 29, 2025
Critical vulnerabilities doesn't have to be complex or have a CVE - @deepseek_ai publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data.

No one is safe from security mistakes, follow along to learn more 🧵 Image
@deepseek_ai @wiz_io When facing the task of discovering vulnerabilities on a specific company, the first step is to identify the externally facing attack surface, and later exploiting potential vulnerabilities - in this case, the 2 steps combined all together.

It all starts with DNS Discovery!
Taking our target root domain (for Bug Bounty / Responsible Disclosure) such as deepseek[.]com, we will want to feed it into DNS Discovery tools, those divide to 2 main workflows - Passive & Active.

In the passive sense, we want to query public DNS datasets all over the internet and collect known subdomains of our target, the best way to do that is using a tool such as subfinder by @pdiscoveryio

In the active sense, we will collect public wordlists with hundreds of thousands of domain names, and will try to fuzz and "guess" additional valid domains under our target - deepseek[.]com, such as "admin.deepseek[.].com" etc,etc...

For this task, a tool I recommend is Puredns github.com/d3mondev/pured…

Which is simply run by the following command:

Additionally, there are more techniques such as permutation (adding dev-admin.deepseek[.]com for example) but we will leave it like that.

The goal of this phase is to collect a list of valid subdomains, and save them all in a single place.

Valid subdomain in our sense - a DNS record that has an IP Address or points to another asset.Image
Image
Read 10 tweets
Aug 16, 2023
I've earned more than 5-figure bounties from sensitive links, sent via email, that were leaked without any user interaction. Surprisingly, the leaks came from the very security vendors that were supposed to protect the victims.

Curious how this happens? 👇

#BugBounty Image
Major organizations globally use various tools to enhance their email security.

Two common approaches are passive and active detection of potential malware within incoming emails. Image
One popular tool for "sandboxed" evaluation of a link's legitimacy is .

Security vendors around the world use it, often under the hood within their own very expensive products. urlscan.io
Image
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(