logman_0x01's profile picture.

Logman Tarig

@logman_0x01

Logman Tarig reposted

I’m gonna give 10 random people that repost this and follow me $25,000 for fun (the $250,000 my X video made) I’ll pick the winners in 72 hours


Logman Tarig reposted

url/?f=etc/passwd ==> 403 encode etc/passwd as base64 url/?f=L2V0Yy9wYXNzd2Q= ==> 200 #note you can use this trick in SQL , SSTI , XSS , LFI , Etc... #bugbountytips #bugbountytip

GodfatherOrwa's tweet image. url/?f=etc/passwd ==> 403
encode etc/passwd as base64

url/?f=L2V0Yy9wYXNzd2Q=  ==> 200

#note 
you can use this trick in SQL , SSTI , XSS , LFI , Etc...

#bugbountytips #bugbountytip

Logman Tarig reposted

جلس أحد الشّيوخ بين طلابه يشرح "نُونيِّة القحطَاني" فلمَّا وصل إلى البيت القائل: لا تحشُ بطنَك بالطَّعامِ تسمّناً فجسوم أهل العلمِ غير سِمانِ وكان الشيخ سميناً، فقال: هذا البيت محل نظر.


Logman Tarig reposted

It seems the new PHP 8 treat MySQL error msgs as "fatal errors" not shown anymore in regular MySQL injection triggering. How to test for it: Number Input ?id=0.or-1%23 String Input ?s='or-1%23 If it returns the 1st regular result of the page or more than 1 result, bingo! #SQLi

RodoAssis's tweet image. It seems the new PHP 8 treat MySQL error msgs as "fatal errors" not shown anymore in regular MySQL injection triggering. How to test for it:

Number Input
?id=0.or-1%23

String Input
?s='or-1%23

If it returns the 1st regular result of the page or more than 1 result, bingo! #SQLi
RodoAssis's tweet image. It seems the new PHP 8 treat MySQL error msgs as "fatal errors" not shown anymore in regular MySQL injection triggering. How to test for it:

Number Input
?id=0.or-1%23

String Input
?s='or-1%23

If it returns the 1st regular result of the page or more than 1 result, bingo! #SQLi

Logman Tarig reposted

A thread🧵 💸Secrets of automation-kings in bug bounty💸 Finding 1day (or 1month) web exploits that haven't made their into scanners yet can make you big money. Read more to understand where and how to get an edge in this area! 🚨Retweet, follow, & like for more! 🚨 1/x


Logman Tarig reposted

كن سبباً في كثرة الصلاة على النبي ﷺ


My first ever private invitation Super excited 😁 @Bugcrowd

logman_0x01's tweet image. My first ever private invitation
Super excited 😁 @Bugcrowd

Logman Tarig reposted

Here's a really cool mind map for pentesting Active Directory xmind.net/m/5dypm8/


Logman Tarig reposted

Quick and basic recon script for finding subdomains #bugbounty #bugbountytips

bughunty's tweet image. Quick and basic recon script for finding subdomains

#bugbounty #bugbountytips

Logman Tarig reposted

"My Methodology In Recon And Find Bugs & My Methodology In Hunting Using Phone" written by @GodfatherOrwa medium.com/@orwaatyat/my-… #Recon #dorking #bugbountytips


Logman Tarig reposted

🧵 Short thread about my last P1 submission 🧵 After a few hours of playing around with the application, I found a static subdomain sub.REDACTED.com I usually analyze the javascript files of the static domains, and as a result, I found... 1/6🧵


Logman Tarig reposted

إِنَّا كُلَّ شَيْءٍ خَلَقْنَاهُ بِقَدَرٍ ﴿49﴾


Logman Tarig reposted

Evaluating Burp Suite Enterprise Edition or Burp Suite Professional? Use our new Gin and Juice shop to put Burp Scanner to the test. This is a realistic example of a modern website, containing serious vulnerabilities you might encounter in the wild. portswigger.net/blog/gin-and-j…

Burp_Suite's tweet image. Evaluating Burp Suite Enterprise Edition or Burp Suite Professional? Use our new Gin and Juice shop to put Burp Scanner to the test. This is a realistic example of a modern website, containing serious vulnerabilities you might encounter in the wild. portswigger.net/blog/gin-and-j…

Logman Tarig reposted

This is by far my favorite wordlist to use for pentesting and bug bounty hunting . Its a little old but still works very well! github.com/Bo0oM/fuzz.txt #bugbountytips #bugbounty #redteam #Pentesting #PenTest #infosec


Logman Tarig reposted

Authorization. Easy to understand. Critical if implemented incorrectly. Want to see an example? (dumb question Corben, yes, why not) Last month, I found an auth bypass that lead to a full account takeover. Here's how I found it:


Logman Tarig reposted

FREE LABS TO TEST YOUR PENTEST/CTF SKILLS Share with your network and friends. #cybersecurity #bugbounty #hacking #infosec #bugbountytips #ctf #pentesting 🧵 1/n


Loading...

Something went wrong.


Something went wrong.