Allows an attacker to execute arbitrary operating system (OS) commands on the server that is running an application
leads to fully compromising the application and all its data.
Thread 🧵 : 👇
Anatomy for OS Command Injection attack
Two basic ways attackers deploy OS command injection
Feb 24, 2023 • 4 tweets • 2 min read
A JavaScript bookmarklet for extracting all webpage endpoint links on a page.
Created by @renniepak, this JavaScript code snippet can be used to extract all endpoints (starting with /) from the current webpage DOM including all external script sources embedded on webpage.
1/n
Usage (Bookmarklet)
Create a bookmarklet...
• Right-click your bookmark bar
• Click 'Add Page'
• Paste the above Javascript in the 'url' box
• Click 'Save'
...then visit the victim page in the browser and click the bookmarklet.
• Don’t report SSRF, Escalate to RCE.
• Don’t report Self-XSS, Chain it with Clickjacking.
• Don’t report Self-Stored XSS, Chain it with CSRF.
More🧵(1/n) : 👇
• Don’t report Information Disclosure, try to use it (Privileges Escalation).
• Don’t report Open Redirect, Escalate it to ATO
➡List of Some Attacks Topics that You Should do some research and read the Blogs/reports on them.👇
More🧵:👇
Feb 2, 2023 • 5 tweets • 2 min read
I asked ChatGPT To Build TimeTable
To Balance Bugbounty, learning & Avoid Burnout
Here's What it Build: A Thread 🧵👇
• 7:00 AM - 7:30 AM: Meditation and reading Spiritual Book
• 8:30 AM - 12:00 PM: Focus on learning web application security, network security, or any specific area you want to improve on. This can be through online courses, reading books,
• 12:00 PM - 1:00 PM: Break
Jan 11, 2023 • 6 tweets • 2 min read
27 ways to learn ethical hacking for free:
Credit: ❔
1. Root Me — Challenges. 2. Stök's YouTube — Videos. 3. Hacker101 Videos — Videos. 4. InsiderPhD YouTube — Videos. 5. EchoCTF — Interactive Learning. 6. Vuln Machines — Videos and Labs. 7. Try2Hack — Interactive Learning.
8. Pentester Land — Written Content. 9. Checkmarx — Interactive Learning. 10. Cybrary — Written Content and Labs. 11. RangeForce — Interactive Exercises. 12. Vuln Hub — Written Content and Labs. 13. TCM Security — Interactive Learning. 14. HackXpert — Written Content and Labs.
Jan 11, 2023 • 7 tweets • 2 min read
If You wanna Enter the field of Android Penetration Testing
Then, You should Open This Thread 🧵
Thread 🧵 :👇
• Gain a strong understanding of the Android operating system and the underlying Linux system that it is built on
Learn about the file system, system settings, and the various services and processes that run on an Android device.
Dec 28, 2022 • 8 tweets • 2 min read
How to detect and prevent host header injection attacks
HTTP Host header attacks exploit vulnerable websites that handle the value of the Host header in an unsafe way.
Dec 26, 2022 • 4 tweets • 1 min read
4 Ways to become a bug bounty hunter
``4 ways to become a bug bounty hunter```
1️⃣ Clear your web fundamentals first
2️⃣ practice this on Tryhackme and any other place that you know well
A zone transfer is a process of transferring DNS zone data from one DNS server to another.
Zone transfers are typically used to replicate DNS data across multiple servers, and are an important part of the DNS infrastructure.
To perform a zone transfer, you will need to have access to a DNS server that is authorized to perform zone transfers.
This typically requires access to the DNS server's configuration settings, which may require authentication.
Dec 16, 2022 • 9 tweets • 2 min read
Effectively use Shodan to search for and identify specific types of devices and systems on the internet.
Some tips on how to use Shodan like a pro :👇
➡️ Use filters to narrow your search: Shodan has a wide range of filters that you can use to narrow your search and find specific types of devices or systems.
Dec 16, 2022 • 10 tweets • 2 min read
Techniques to bypass WAF :👇
✨ Here are some potential ways to bypass a WAF:
➡️ Encoding: Some WAFs are not able to properly decode encoded data, so encoding your payloads or requests may allow them to bypass the WAF.
Dec 13, 2022 • 7 tweets • 1 min read
🔰 How to Find XSS Like a Pro
Thread 🧵:👇
✨ To find XSS (Cross-Site Scripting) bugs, you can use combination of manual testing and automated tools.
Some steps you can follow to find XSS:
➡️ identify potential entry points for XSS attacks, such as input fields in web forms, query parameters in URLs, or file uploads.