Some of the vulnerailities are explained here, take a look down here
https://samcurry.net/hacking-apple/
https://honoki.net/2020/02/18/http-request-smuggling-5-practical-tips/
https://buer.haus/2017/06/29/escalating-xss-in-phantomjs-image-rendering-to-ssrflocal-file-read/
https://www.hahwul.com/phoenix/ssrf-open-redirect
https://hackerone.com/reports/978680
https://medium.com/@pratiky054/html-injection-unique-exploitation-a5c3d4e6fed8 https://footstep.ninja/posts/html-injection-in-email/
https://blog.dixitaditya.com/leveraging-xss-to-read-internal-files/amp/?__twitter_impression=true
https://medium.com/@mrnikhilsri/unauthenticated-account-takeover-through-http-leak-33386bb0ba0b
http://www.kamilonurozkaleli.com/posts/starbucks-singapore-account-takeover/
https://rootsploit.com/exploiting-csrf-on-json-endpoint-w-o-flash/#comment-5
(Note: Rootsploit has plenty of posts for Bug Bounty Writeups)
https://rootsploit.com/
https://medium.com/@sechunter/js-is-love-%EF%B8%8F-ca393a4849e9
https://medium.com/@sechunter/exploiting-admin-panel-like-a-boss-fc2dd2499d31
https://hipotermia.pw/bb/bugpoc-lfi-challenge
https://medium.com/@ricardoiramar/the-powerful-http-request-smuggling-af208fafa142
https://medium.com/intigriti/how-i-hacked-hundreds-of-companies-through-their-helpdesk-b7680ddc2d4c
https://hackerone.com/reports/999765
https://sites.google.com/securifyinc.com/secblogs/scary-tickets
https://saadahmedx.medium.com/weaponizing-xss-for-fun-profit-a1414f3fcee9
https://community.turgensec.com/shodan-pentesting-guide/
https://medium.com/bugbountywriteup/hacking-http-cors-from-inside-out-512cb125c528
https://blog.cobalt.io/a-pentesters-guide-to-http-request-smuggling-8b7bf0db1f0
https://devcraft.io/2020/10/18/github-rce-git-inject.html
https://blog.orange.tw/2020/09/how-i-hacked-facebook-again-mobileiron-mdm-rce.html?m=1
https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html
https://bugreader.com/ahmad_halabi@idor-sql-query-manipulation-to-fetch-user-details-228
http://rez0.blog/category/hacking.html
https://corneacristian.medium.com/top-25-xxe-bug-bounty-reports-ab4ca662afad
https://ruvlol.medium.com/1000-for-open-redirect-via-unknown-technique-675f5815e38a
https://jorenverheyen.github.io/intigriti-november-2020.html
https://imparable.medium.com/attacking-json-web-tokens-jwts-d1d51a1e17cb
https://honoki.net/2020/08/10/cve-2020-11518-how-i-bruteforced-my-way-into-your-active-directory
https://bhavukjain.com/blog/2020/05/30/zeroday-signin-with-apple
📅 16-Nov-2020
https://medium.com/@rezaduty/play-with-google-twitter-apple-dell-278c73ebde34
https://github.com/jas502n/CVE-2020-14882
https://medium.com/@estebancano/unique-xxe-to-aws-keys-journey-afe678989b2b
https://honoki.net/2018/12/12/from-blind-xxe-to-root-level-file-read-access/
📅 18-Nov-2020
https://cyc10n3.medium.com/rce-via-server-side-template-injection-ad46f8e0c2ae
https://cyc10n3.medium.com/rce-via-server-side-template-injection-ad46f8e0c2ae
📅 20-Nov-2020
https://medium.com/@logicbomb_1/tale-of-3-vulnerabilities-to-account-takeover-44ba631a0304
https://0xgaurang.medium.com/out-of-band-xxe-in-an-e-commerce-ios-app-e22981f7b59b
📅 23-Nov-2020
https://r2c.dev/blog/2020/exploiting-dynamic-rendering-engines-to-take-control-of-web-apps/
📅 25-Nov-2020
https://medium.com/@ved_wayal/hail-frida-the-universal-ssl-pinning-bypass-for-android-e9e1d733d29
📅 30-Nov-2020
https://hackerone.com/reports/713285
https://portswigger.net/web-security/request-smuggling/finding
https://hackerone.com/reports/831962
https://hackerone.com/reports/1026585
https://hackerone.com/reports/1010835
https://www.veracode.com/blog/research/exploiting-spring-boot-actuators
Some Cool Writeups of IDOR Vulnerabilities 😎
- https://medium.com/@aysebilgegunduz/everything-you-need-to-know-about-idor-insecure-direct-object-references-375f83e03a87
- https://corneacristian.medium.com/top-25-idor-bug-bounty-reports-ba8cd59ad331
- https://medium.com/bugbountywriteup/all-about-getting-first-bounty-with-idor-849db2828c8
- https://medium.com/bugbountywriteup/a-short-story-of-idor-to-account-takeover-b36f3983ecba
- https://medium.com/@swapmaurya20/a-simple-idor-to-account-takeover-88b8a1d2ec24
- https://mustafakemalcan.com/insecure-direct-object-reference-idor-tips/
- https://medium.com/bugbountywriteup/pii-leakage-via-idor-weak-passwordreset-full-account-takeover-58d159f88d73
- https://medium.com/bugbountywriteup/a-short-story-of-idor-to-account-takeover-b36f3983ecba
- https://xploitprotocol.medium.com/hunt-for-the-idor-automation-using-burp-suit-a09f004a9d9d
- https://medium.com/@abhiunix/idor-on-api-endpoints-e08c740e87a2
- https://medium.com/@cobrabaghdad1/idor-lead-to-personally-identifiable-information-pii-leakage-fb2b1b4be93f
- https://www.youtube.com/watch?v=EjuDr5bLNek&ab_channel=AliT%C3%9CT%C3%9CNC%C3%9C
- https://www.youtube.com/watch?v=FPrNEv9a588&ab_channel=AliT%C3%9CT%C3%9CNC%C3%9C
📅 03-Dec-2020
https://dreamlab.net/en/blog/post/abusing-exposed-docker-registry-apis/
https://hackerone.com/reports/972601
📅 08-Jan-2021
https://www.hackingarticles.in/android-penetration-testing-drozer/
📅 21-Jan-2021
- https://yasoob.me/posts/reverse-engineering-android-apps-apktool/
- https://joshspicer.com/android-frida-1
- https://book.hacktricks.xyz/mobile-apps-pentesting/android-app-pentesting/frida-tutorial
- https://resources.infosecinstitute.com/topic/frida/#gref
- https://frida.re/docs/examples/android/
📅 21-Jan-2021
📅 01-Dec-2020
https://hackerone.com/reports/962462
https://hackerone.com/reports/766578
https://hackerone.com/reports/999765
📅 07-Jan-2021
https://0xpatrik.com/asset-discovery/
https://0xpatrik.com/takeover-proofs/
---------------------------------------------------------- 👉 Back to Main Page 👈 ---------------------------------------------------------