HackenProof Profile picture
Expert web3 bug bounty and crowdsourced audit platform with 150 programs and over 20 million in bounty DS: https://t.co/rGKYeQfUky YT: https://t.co/cLUr6ODztP
Jun 20, 2023 9 tweets 2 min read
How to Become a Web Application Bug Bounty Hunter

Mastering Web Application Security with Free Resources

Become a web app bug bounty hunter to explore vulnerabilities and enhance skills. Contribute to a safer digital landscape with an exhilarating path.

#bugbounty Image Become familiar with the Linux terminal Bandit CTF is one of the best places to do that. It is a beginner-friendly Capture The Flag (CTF) challenge designed to teach and test basic command-line skills and Linux system security concepts.
Mar 13, 2023 10 tweets 4 min read
1/

Vuln: SSTI

Severity: Severity of the issue depends on from the engine that has been used

Server-side template injection occurs when user input is unsafely embedded into a server-side template, allowing users to inject template directives.

#bugbountytips #securitytips #SSTI 2/
Constructing a server-side template injection attack

Detect → Identify → Exploit

- Detect if SST is vulnerable to attack
• Identify the engine that the server uses. There are a huge number of templating languages, characters.
• Develop exploit on received data