A lesser-known yet effective way of #bugbounty hunting is called "hacktivity" hunting. It involves bypassing fixes on disclosed reports found on @Hacker0x01's hacktivity page. This approach helped me score a $5k bounty! Here's how it works.👇
With hacktivity hunting, the hard part - finding interesting behavior or insecure features - is already done for you. Your main role is to find a bypass.
The original report tried to restrict access to /admin by restricting the path in Nginx. However, I bypassed it using simple encoding - /%2561dmin. Endpoints required authentication, but I bypassed this by adding ".json" at the end.
By adding ".json" and providing parameters, I could access all endpoints, even those that would allow an attacker to take over any user's account (e.g., /sudo endpoint).
There was even a whole swagger UI file with endpoint names and parameters. #CyberSecurity#InfoSec
Hacktivity hunting can be a goldmine for finding bypasses. @vickieli7 wrote a fantastic article about exploiting SSRF by testing disclosed reports for bypasses.
The key to successful hacktivity hunting is persistence and creativity. Always look for new ways to bypass fixes, and don't be afraid to test and retest the same disclosed reports. #BugBountyTips#InfoSec
Remember, sharing knowledge is crucial to the #InfoSec community. By learning from others' disclosed reports, we can improve our skills and better protect applications from potential attacks.