Skip to content

Latest commit

 

History

History
259 lines (186 loc) · 10.5 KB

Bug_bounty_blogs.md

File metadata and controls

259 lines (186 loc) · 10.5 KB

👨🏻‍💻 Bug Bounty Blogs and Writeups of different vulnerablities

This is how they hacked Apple

Some of the vulnerailities are explained here, take a look down here

https://samcurry.net/hacking-apple/

HTTP Request Smuggling Tips from honoki

https://honoki.net/2020/02/18/http-request-smuggling-5-practical-tips/

XSS in PhantomJS

https://buer.haus/2017/06/29/escalating-xss-in-phantomjs-image-rendering-to-ssrflocal-file-read/

Exploiting Open Redirect Vulnerabilities

https://www.hahwul.com/phoenix/ssrf-open-redirect
https://hackerone.com/reports/978680

HTML Injection

https://medium.com/@pratiky054/html-injection-unique-exploitation-a5c3d4e6fed8 https://footstep.ninja/posts/html-injection-in-email/

Leveraging XSS to Read Internal Files

https://blog.dixitaditya.com/leveraging-xss-to-read-internal-files/amp/?__twitter_impression=true

Unauthenticated Account Takeover through HTTP Leak

https://medium.com/@mrnikhilsri/unauthenticated-account-takeover-through-http-leak-33386bb0ba0b

Account Takeover via IDOR in Starbucks Singapore

http://www.kamilonurozkaleli.com/posts/starbucks-singapore-account-takeover/

CSRF Exploiting in JSON Endpoint

https://rootsploit.com/exploiting-csrf-on-json-endpoint-w-o-flash/#comment-5

(Note: Rootsploit has plenty of posts for Bug Bounty Writeups)
https://rootsploit.com/

Find Sensitive Information via Source Code

https://medium.com/@sechunter/js-is-love-%EF%B8%8F-ca393a4849e9

Exploiting Admin Panel Like a Boss

https://medium.com/@sechunter/exploiting-admin-panel-like-a-boss-fc2dd2499d31

🐞 BugPoC LFI Challenge

https://hipotermia.pw/bb/bugpoc-lfi-challenge

Powerfull HTTP Request Smugling

https://medium.com/@ricardoiramar/the-powerful-http-request-smuggling-af208fafa142

Ticket Tricks

How I hacked hundreds of companies through their helpdesk

https://medium.com/intigriti/how-i-hacked-hundreds-of-companies-through-their-helpdesk-b7680ddc2d4c https://hackerone.com/reports/999765
https://sites.google.com/securifyinc.com/secblogs/scary-tickets

Weaponizing XSS For Fun & Profit😆😂🤣

https://saadahmedx.medium.com/weaponizing-xss-for-fun-profit-a1414f3fcee9

Shodan Pentesting Guide

https://community.turgensec.com/shodan-pentesting-guide/

Hacking HTTP CORS from inside out: a theory to practice approach

https://medium.com/bugbountywriteup/hacking-http-cors-from-inside-out-512cb125c528

HTTP Request Smuggling

https://blog.cobalt.io/a-pentesters-guide-to-http-request-smuggling-8b7bf0db1f0

Bad Neighbour Vulnerability

http://blog.pi3.com.pl/?p=780

RCE via git option injection (almost) - $20,000 Bounty

https://devcraft.io/2020/10/18/github-rce-git-inject.html

How I Hacked Facebook Again! Unauthenticated RCE on MobileIron MDM

https://blog.orange.tw/2020/09/how-i-hacked-facebook-again-mobileiron-mdm-rce.html?m=1

Compromising S3 Buckets through Misconfigured AWS Cognito

https://medium.com/@curlsandbun/compromising-s3-buckets-through-misconfigured-aws-cognito-e23f08b2f475

Gateway2Hell – Multiple Privilege Escalation Vulnerabilities in Citrix Gateway Plug-In - Cymptom

https://cymptom.com/gateway2hell-multiple-privilege-escalation-vulnerabilities-in-citrix-gateway-plug-in/2020/10/*

Multiple Address Bar Spoofing Vulnerabilities In Mobile Browsers

https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html

IDOR and SQL Injection

https://bugreader.com/ahmad_halabi@idor-sql-query-manipulation-to-fetch-user-details-228

Recon and Hacking tip blog

http://rez0.blog/category/hacking.html

XXE

https://corneacristian.medium.com/top-25-xxe-bug-bounty-reports-ab4ca662afad

Open Redirect via unknown technique

https://ruvlol.medium.com/1000-for-open-redirect-via-unknown-technique-675f5815e38a

📅 10-Nov-2020

Intigriti November XSS Challenge

https://jorenverheyen.github.io/intigriti-november-2020.html

📅 11-Nov-2020

JWT Hacking

https://imparable.medium.com/attacking-json-web-tokens-jwts-d1d51a1e17cb

CVE-2020-11518: how I bruteforced my way into your Active Directory

https://honoki.net/2020/08/10/cve-2020-11518-how-i-bruteforced-my-way-into-your-active-directory

Sp1d3R's Security Blog

https://xpoc.pro/

Apple Hack by JWT

https://bhavukjain.com/blog/2020/05/30/zeroday-signin-with-apple

📅 16-Nov-2020

Google cloud shell Account Takeover as Root

https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/

Business Logic Error to ATO

https://protector47.medium.com/bounty-1000-critical-business-logic-flaws-leads-to-account-takeover-product-amount-9b5715a84613

Apache Tomcat RCE

https://medium.com/@romnenko/apache-tomcat-deserialization-of-untrusted-data-rce-cve-2020-9484-afc9a12492c4

PLay with Google, Twitter, Apple and Dell

https://medium.com/@rezaduty/play-with-google-twitter-apple-dell-278c73ebde34

CVE-2020–14882 Weblogic Unauthorized bypass RCE

https://github.com/jas502n/CVE-2020-14882

Facebook Messenger Leaking Access Token in IOS

https://medium.com/@guhanraja/how-i-found-the-facebook-messenger-leaking-access-token-of-million-users-8ee4b3f1e5e3

Unique XXE to AWS Keys journey

https://medium.com/@estebancano/unique-xxe-to-aws-keys-journey-afe678989b2b

From blind XXE to root level file read

https://honoki.net/2018/12/12/from-blind-xxe-to-root-level-file-read-access/

📅 18-Nov-2020

Steal All cookies from Firefox Android

https://cyc10n3.medium.com/rce-via-server-side-template-injection-ad46f8e0c2ae

RCE via Server-Side Template Injection

https://cyc10n3.medium.com/rce-via-server-side-template-injection-ad46f8e0c2ae

📅 20-Nov-2020

Tale of 3-vulnerabilities-to-account-takeover

https://medium.com/@logicbomb_1/tale-of-3-vulnerabilities-to-account-takeover-44ba631a0304

XXE in an E-Commerce IOS Application

https://0xgaurang.medium.com/out-of-band-xxe-in-an-e-commerce-ios-app-e22981f7b59b

📅 23-Nov-2020

Exploiting-dynamic-rendering-engines-to-take-control-of-web-apps

https://r2c.dev/blog/2020/exploiting-dynamic-rendering-engines-to-take-control-of-web-apps/

📅 25-Nov-2020

SSL Pinning with FRIDA

https://medium.com/@ved_wayal/hail-frida-the-universal-ssl-pinning-bypass-for-android-e9e1d733d29

📅 30-Nov-2020

HTTP Request Smuggling Twitter

https://hackerone.com/reports/713285

HTTP Request Smuggling Portswigger

https://portswigger.net/web-security/request-smuggling/finding

XSS on Issue Reference in Github - H1 Report

https://hackerone.com/reports/831962

XSS Challenge - H1 Report

https://hackerone.com/reports/1026585

API Security CTF

https://blog.pentesteracademy.com/overview-of-the-dreaded-api-security-ctf-challenge-nov-20-24-830f09122a6

Synk Blog

blog-synk

GraphQL Hack in Shopify Privilege Escalation

https://hackerone.com/reports/1010835

Alex Chapman's Blog

ajax-blog

Exlpoiting SpringBoot Actuator - Veracode

https://www.veracode.com/blog/research/exploiting-spring-boot-actuators

IDOR Writeup Blogs

Medium
Some Cool Writeups of IDOR Vulnerabilities 😎

Video POC

Stored XSS POC

Security Creators Videos

security creators video

📅 03-Dec-2020

Host docker binary overwrite from Kata VM - Alex Chapman

https://bugcrowd.com/disclosures/7bf77429-2b94-44ea-b6f9-c1fc59b2fd17/host-docker-binary-overwrite-from-kata-vm

Abusing Docker API

https://dreamlab.net/en/blog/post/abusing-exposed-docker-registry-apis/

Open redirect Bypass H1 - Report

https://hackerone.com/reports/972601

📅 08-Jan-2021

Android Pentesting : Drozer

https://www.hackingarticles.in/android-penetration-testing-drozer/

📅 21-Jan-2021

Android Hacking

📅 21-Jan-2021

GraphQL Hacking Explained

📅 01-Dec-2020

H1 Reports

Gitlab - Unauthorized user is able to access schedule pipeline variables and values

https://hackerone.com/reports/962462

Affirm - Absence of Token expiry leads to Unauthorized login Access

https://hackerone.com/reports/766578

Ticket Trick

https://hackerone.com/reports/999765

📅 07-Jan-2021

Asset Discovery

https://0xpatrik.com/asset-discovery/

Patrick Hudak

https://0xpatrik.com/

Subdomain Takeover POC

https://0xpatrik.com/takeover-proofs/

---------------------------------------------------------- 👉 Back to Main Page 👈 ---------------------------------------------------------