Abhishek Meena - {🔥} Profile picture
Chief Operating Officer @Vulncure | Bug Hunter | 🖊️ Tester 🤝 Committed to infosec education. 📬 Open for DMs
4 subscribers
Jun 2, 2023 13 tweets 13 min read
Some of the major vulnerabilities and related POC’s:

➡SQLi
➡XSS
➡SSRF
➡XXE
➡Path Traversal
➡Open Redirection
➡Account Takeover
➡Remote code execution
➡IDOR
➡CSRF

#hacking #bugbounty #bugbountytips

Are Found Below🧵(1/n)👇 SQLi POC’s:

#hacking #bugbounty #bugbountytips

1. medium.com/@mahitman1/hac…

2. krevetk0.medium.com/burpsuit-sqlma…
Feb 26, 2023 32 tweets 7 min read
OS Command Injection 🕸️🔖

Allows an attacker to execute arbitrary operating system (OS) commands on the server that is running an application

leads to fully compromising the application and all its data.

Thread 🧵 : 👇 Anatomy for OS Command Injection attack

Two basic ways attackers deploy OS command injection
Feb 24, 2023 4 tweets 2 min read
A JavaScript bookmarklet for extracting all webpage endpoint links on a page.

Created by @renniepak, this JavaScript code snippet can be used to extract all endpoints (starting with /) from the current webpage DOM including all external script sources embedded on webpage.

1/n Usage (Bookmarklet)

Create a bookmarklet...

• Right-click your bookmark bar
• Click 'Add Page'
• Paste the above Javascript in the 'url' box
• Click 'Save'

...then visit the victim page in the browser and click the bookmarklet.

carbon.now.sh/?bg=rgba%2842%…
Feb 9, 2023 9 tweets 2 min read
Difference Between GET, POST, PUT, DELETE, HEAD, and PATCH Request Methods

Open The Thread 🧵 :👇🏻 GET, POST, PUT, DELETE, HEAD, and PATCH Request Methods 📌 GET:

This method is used to retrieve information from a server.

When a client sends a GET request to a server, the server returns the requested information in the response.

GET requests are typically used to retrieve data from a web server.
Feb 8, 2023 10 tweets 3 min read
✨Awesome Bug Bounty Tools For: 🙌👇🏻

• Subdomain Enumeration
• Content Discovery
• Exploitation
• CMS
• Git
• Frameworks Tools
• Wordlists

Open The Thread🧵:👇 ▪ Subdomain Enumeration Tools List

—————————
I've opened My Bug Bounty tips Group =>
Join Link: t.me/bugbountyresou…
————————— ▪ Subdomain Enumeration Tools List
Feb 7, 2023 11 tweets 3 min read
⚡Security Misconfiguration 🌻

One of the top causes of website and application vulnerabilities.

It occurs when systems are not properly configured, leaving them open to attack.

Thread ( 1/10 ) : 🧵 Security Misconfiguration 💻Security Misconfiguration Occurance:

• Inadequate security hardening & improper configs in app stack/cloud services

• Enabled unnecessary features/ports/services/accounts/privileges

• Default accounts with unchanged passwords

• Error handling revealing sensitive info
Feb 6, 2023 10 tweets 2 min read
Here's a basic API hacking checklist: 🙌

Open Thread 🧵⚡ API PenTesting 🌻 Verify input validation:

Test the API to determine if it properly validates and sanitizes inputs to prevent any malicious payloads from being processed.
Feb 4, 2023 7 tweets 3 min read
✨Bug Bounty Pro Tip:

➡Escalate everything you find!
#bugbounty #Infosec #hacking

• Don’t report SSRF, Escalate to RCE.
• Don’t report Self-XSS, Chain it with Clickjacking.
• Don’t report Self-Stored XSS, Chain it with CSRF.

More🧵(1/n) : 👇 • Don’t report Information Disclosure, try to use it (Privileges Escalation).
• Don’t report Open Redirect, Escalate it to ATO

➡List of Some Attacks Topics that You Should do some research and read the Blogs/reports on them.👇

More🧵:👇
Feb 2, 2023 5 tweets 2 min read
I asked ChatGPT To Build TimeTable
To Balance Bugbounty, learning & Avoid Burnout

Here's What it Build: A Thread 🧵👇 Image • 7:00 AM - 7:30 AM: Meditation and reading Spiritual Book

• 8:30 AM - 12:00 PM: Focus on learning web application security, network security, or any specific area you want to improve on. This can be through online courses, reading books,

• 12:00 PM - 1:00 PM: Break
Jan 11, 2023 6 tweets 2 min read
27 ways to learn ethical hacking for free:

Credit: ❔

1. Root Me — Challenges.
2. Stök's YouTube — Videos.
3. Hacker101 Videos — Videos.
4. InsiderPhD YouTube — Videos.
5. EchoCTF — Interactive Learning.
6. Vuln Machines — Videos and Labs.
7. Try2Hack — Interactive Learning. 8. Pentester Land — Written Content.
9. Checkmarx — Interactive Learning.
10. Cybrary — Written Content and Labs.
11. RangeForce — Interactive Exercises.
12. Vuln Hub — Written Content and Labs.
13. TCM Security — Interactive Learning.
14. HackXpert — Written Content and Labs.
Jan 11, 2023 7 tweets 2 min read
If You wanna Enter the field of Android Penetration Testing

Then, You should Open This Thread 🧵

Thread 🧵 :👇 Android Penetration Testing • Gain a strong understanding of the Android operating system and the underlying Linux system that it is built on

Learn about the file system, system settings, and the various services and processes that run on an Android device.
Dec 28, 2022 8 tweets 2 min read
How to detect and prevent host header injection attacks HTTP Host header attacks exploit vulnerable websites that handle the value of the Host header in an unsafe way.
Dec 26, 2022 4 tweets 1 min read
4 Ways to become a bug bounty hunter ``4 ways to become a bug bounty hunter```

1️⃣ Clear your web fundamentals first

2️⃣ practice this on Tryhackme and any other place that you know well

Thread🧵 👆:👇
Dec 22, 2022 14 tweets 9 min read
Bug Bounty Automation Oneliner Commands
- { V1 } Find Subdomain - { One-liner }

#bugbounty #infosec
Dec 21, 2022 4 tweets 2 min read
Topic - DNS -> Zone Transfer

A zone transfer is a process of transferring DNS zone data from one DNS server to another.

Zone transfers are typically used to replicate DNS data across multiple servers, and are an important part of the DNS infrastructure. To perform a zone transfer, you will need to have access to a DNS server that is authorized to perform zone transfers.

This typically requires access to the DNS server's configuration settings, which may require authentication.
Dec 16, 2022 9 tweets 2 min read
Effectively use Shodan to search for and identify specific types of devices and systems on the internet.

#bugbounty #infosec

Some tips on how to use Shodan like a pro :👇 ➡️ Use filters to narrow your search: Shodan has a wide range of filters that you can use to narrow your search and find specific types of devices or systems.
Dec 16, 2022 10 tweets 2 min read
Techniques to bypass WAF :👇 ✨ Here are some potential ways to bypass a WAF:

➡️ Encoding: Some WAFs are not able to properly decode encoded data, so encoding your payloads or requests may allow them to bypass the WAF.
Dec 13, 2022 7 tweets 1 min read
🔰 How to Find XSS Like a Pro

Thread 🧵:👇 ✨ To find XSS (Cross-Site Scripting) bugs, you can use combination of manual testing and automated tools.

Some steps you can follow to find XSS:

➡️ identify potential entry points for XSS attacks, such as input fields in web forms, query parameters in URLs, or file uploads.
Dec 13, 2022 4 tweets 3 min read
Important tools solving CTF challenges.

#bugbounty #infosec

++Networking
- Wireshark, tshark
- tcpdump
- netcat, telnet
- nmap

++Forensics
- dd
- strings
- scalpel
- TrID
- binwalk

My Bugbounty Tips Group Link :
t.me/bugbountyresou…
=====================

Thread More 🧵:👇 Remaining ++Forensics
- foremost
- ExifTool
- Any hex editor
- DFF
- CAINE
- The Sleuth kit
- Volatility

++Cryptography
- Cryptool
- hashpump
- Sage
- John the Ripper
- hashcat
- Online tools(web)
- Modules for python

#bugbounty #Infosec

More : 👇
Dec 12, 2022 8 tweets 2 min read
6 Tips To follow to Review Code for Security Bugs

You Must Read : 👇 ⭐ Start by reading the code carefully to get a good understanding of how it works and what it does.
Dec 12, 2022 9 tweets 9 min read
Bug Bounty automation script v2

#bugbounty #bugbountytip #infosec

See 🧵: 👇 Find JavaScript Files

—————————
I've opened My Bug Bounty tips Group => Join Link : t.me/bugbountyresou…
—————————

#bugbounty #Infosec #CyberSec