Expert web3 bug bounty and crowdsourced audit platform with 150 programs and over 20 million in bounty
DS: https://t.co/rGKYeQfUky
YT: https://t.co/cLUr6ODztP
Jun 20, 2023 • 9 tweets • 2 min read
How to Become a Web Application Bug Bounty Hunter
Mastering Web Application Security with Free Resources
Become a web app bug bounty hunter to explore vulnerabilities and enhance skills. Contribute to a safer digital landscape with an exhilarating path.
#bugbounty
Become familiar with the Linux terminal Bandit CTF is one of the best places to do that. It is a beginner-friendly Capture The Flag (CTF) challenge designed to teach and test basic command-line skills and Linux system security concepts.
Mar 13, 2023 • 10 tweets • 4 min read
1/
Vuln: SSTI
Severity: Severity of the issue depends on from the engine that has been used
Server-side template injection occurs when user input is unsafely embedded into a server-side template, allowing users to inject template directives.
- Detect if SST is vulnerable to attack
• Identify the engine that the server uses. There are a huge number of templating languages, characters.
• Develop exploit on received data