Always check for ID’s disclosed in response:
1. Found a json POST request without user ID to fetch user information in the response
2. Adding new parameter “user_id”:<victims ID> in the request body
3. Victims full PII details fetched in response
#bugcrowd#bugbountytips
2FA bypass:
1. Login request path: /api/v1/… -> redirect to 2FA page
2. Manipulate path to: /api/v2/… -> Access token disclosed in response
3. Use “access token” and send request to disable 2FA endpoint
4. 2FA disabled. Now login and get full access.
#bugbounty#bugbountytip
2FA bypass:
1. 2FA activated on main domain
2. Found subdomain : embed.<target>.com
3. Logged in to subdomain with same creds
4. After login to subdomain option to redirect to main domain.
5. Full access to main domain without entering 2FA
#BugBountytips #BugBounty#2fabypass
How to start your journey as a web3 security researcher/auditor?
1. Create an X/Twitter and LinkedIn profile where you will post about your work and connect with the others from the space.
2. Read "Mastering Ethereum" by Gavin Wood (Vyper part is optional)
3. Complete all…
🔍 Abusing 404 Pages for Endpoint Discovery
(The Hidden Recon Technique No One Talks About)
Most hackers move on when they hit a 404 page. It just says “Not Found,” right? But here’s the twist sometimes those 404 pages leak information about real endpoints.
Mr.Holmes: An information gathering tool (OSINT). The main purpose is to gain information about domains, usernames and phone numbers.
GitHub: github.com/Lucksi/Mr.Holm…
🧵 Bug Bounty Tip: Attack Vectors in Forgot Password Flows
"Forgot Password?" — a simple feature, but a goldmine for bugs.
Here are 🔟 high-impact attack vectors to test in password reset flows 👇
#BugBounty#AppSec#WebSecurity
2FA Bypass techniques:🔥
List of 15 Common 2FA Bypasses For Bug Bounty / Penetration Testing.
1. Response Manipulation
In response if "success":false
Change it to "success":true
2. Status Code Manipulation
If Status Code is 4xx
Try to change it to 200 OK and see if it…
[#bugbountytip]
1. Go to a Program's Hacktivity page (or Writeups)
2. Find a P1/P2/P3 patched not so long ago (~1 Year).
3. Understand the Report, and test for that exact same bug on the Live App today.
4. $1337, $7331 or Knowledge++
Don't forget to Thank them Later.
9K Followers 250 FollowingTrying to make Internet a safer place 👨🏼💻 by helping companies find security loopholes. Hustling to make my parents proud! 🧡
400 Followers 2K FollowingCrypto culture aficionado | NFT collector 🌌 | Decentralizing the art world one token at a time | Embracing blockchain's endless potential
3K Followers 316 FollowingBug bounty wizard - All Stars @immunefi. I cast Exorcise on vulnerabilities and Heal on protocols. Prevented exploits worth over $150M.
1.1M Followers 61 FollowingBuild Once, Launch Everywhere.
Access everything from everywhere including native Bitcoin with ZetaChain, the First Universal Blockchain.
13K Followers 431 FollowingNonKyc Exchange https://t.co/pB2GqYUF5b = Deposit, Trade, and Withdraw.
Not your keys, Not your Coins, we don't beg for liquidity !
https://t.co/9594q1UQyS
14.9M Followers 580 FollowingThe world’s leading blockchain ecosystem and digital asset exchange | #Binance #BNB | Support: @BinanceHelpDesk | Posts are not directed towards UK users.
3K Followers 978 FollowingThreatLocker protects against zero-day exploits and cyberattacks by giving you complete control over what runs in your organization.
7.9M Followers 13 FollowingBitcoin is an open source censorship-resistant peer-to-peer immutable network. Trackable digital gold. Don't trust; verify. Not your keys; not your coins.
4.0M Followers 0 FollowingThe universal platform for crypto, blockchain apps, stablecoins & decentralized tech. An account about the Ethereum ecosystem maintained by @ethereumfndn.