masquerad3_r's profile picture. Security Research @ CISPA || Co-Founder @DCG91135 || Automating life with Python and Go

Prerak Mittal

@masquerad3_r

Security Research @ CISPA || Co-Founder @DCG91135 || Automating life with Python and Go

Prerak Mittal 已轉發

Hey, don't miss Tim's YuraScanner presentation today at 11:40 in session 2B, "Web Security" at NDSS '25! Our new task-driven web security scanner features LLM, XSS, and a pinch of 0-days.

pixelindigo's tweet image. Hey, don't miss Tim's YuraScanner presentation today at 11:40 in session 2B, "Web Security" at NDSS '25!

Our new task-driven web security scanner features LLM, XSS, and a pinch of 0-days.

Prerak Mittal 已轉發

I've made over 100k on SSRF vulnerabilities. They aren't always as simple as pointing it at localhost or AWS Metadata service. Here are some tricks I've picked up over the past 5 years of web app testing:

Rhynorater's tweet image. I've made over 100k on SSRF vulnerabilities.

They aren't always as simple as pointing it at localhost or AWS Metadata service. 

Here are some tricks I've picked up over the past 5 years of web app testing:

Prerak Mittal 已轉發

$15k+ Worth of IDORs in the past couple of months; it takes a lot of manual verification, but use this regex in BurpSuite in order to filter out potential parameters: (?i)\b\w*id\b(?!\w)\s*=\s*("[^"]*"|'[^']*'|[^&\s}]*) #bugbountytips #CyberSecurity

moblig_'s tweet image. $15k+ Worth of IDORs in the past couple of months; it takes a lot of manual verification, but use this regex in BurpSuite in order to filter out potential parameters:

(?i)\b\w*id\b(?!\w)\s*=\s*("[^"]*"|'[^']*'|[^&\s}]*)

#bugbountytips #CyberSecurity

Prerak Mittal 已轉發

📣 Stealth and supercharging your offensive security testing using: 🔥 Axiom 🔥 by @pry0cc & @0xtavian Resources and musings on this epic framework. 👇a thread👇


Prerak Mittal 已轉發

💰 New article by our researcher Andrey Bachurin: "Binance Smart Chain Token Bridge Hack" The article explains the technical details of one of the largest cryptocurrency hacks ever. Read the blog post: swarm.ptsecurity.com/binance-smart-…


Prerak Mittal 已轉發

🔍 My ultimate workflow for simple and easy JavaScript Analysis ⚡️ Comprehensive JavaScript analysis in offensive security, appsec testing, and red teaming wins. Often you can find juicy hidden endpoints, parameters, & domains buried JS! A thread 🧵 1/x 👇


Prerak Mittal 已轉發

Are you constantly struggling to keep up with the information security cyber security, bug bounties…the list goes on 🙄 So much info but such little time ⏱️ Check out the newsletters I use the most to keep up with the industry below 📬 A thread 🧵 1/7


Prerak Mittal 已轉發

I don't think this blog post has been shared enough times, but this is what got me into smart contract security, I have read it countless times. Written by code4rena's #1 @cmichelio cmichel.io/how-to-become-…


Prerak Mittal 已轉發

7 projects that will improve your subdomain enumeration game today ⚒️


Prerak Mittal 已轉發

If you want to master SSRF, open this thread! Server-Side Request Forgery vulnerabilities are attacks that allow attackers to send arbitrary requests from the server often resulting in gaining authorized access to data!🤯 A Thread 🧵👇


Prerak Mittal 已轉發

Read my blog on how I was rewarded $$$ for HTTP Request Smuggling leading to webpage defacement: an0nymisss.blogspot.com/2022/08/http-r… Collaborated with @masquerad3_r 🤝


Prerak Mittal 已轉發

🔥 SQL Injection at Scale🔥 | Powered By @pdiscoveryio | Using a combination of subfinder, httpx, katana, GF, and sqlmap. #bugbounty #bugbountytip #bugbountytips #AppSec #hacker #owasp

grumpzsux's tweet image. 🔥 SQL Injection at Scale🔥
| Powered By @pdiscoveryio |

Using a combination of subfinder, httpx, katana, GF, and sqlmap.

#bugbounty #bugbountytip #bugbountytips #AppSec #hacker #owasp

Prerak Mittal 已轉發

taking endpoint parameters and getting sql injection vulnerabilities with sqlmap

0x3n0's tweet image. taking endpoint parameters and getting sql injection vulnerabilities with sqlmap

Prerak Mittal 已轉發

None => Critical (10/10) Second Order Account Takeover : (attacker's VERIFIED email attached to attacker's UNVERIFIED email merged can takeover vicitm's VERIFIED account) H1 : Closing as Self Account Takeover (none). Me : Should I Takeover your Account? H1 : Sure! Me : BOOOM

newfolderj's tweet image. None => Critical (10/10)

Second Order Account Takeover :

(attacker's VERIFIED email attached to attacker's UNVERIFIED email merged can takeover vicitm's VERIFIED account)

H1  : Closing as Self Account Takeover (none).
Me : Should I Takeover your Account?
H1  : Sure!
Me : BOOOM

Prerak Mittal 已轉發

If you want to master API security, open this thread! APIs are used EVERYWHERE for applications to communicate, but let's see how you can HACK them! 👩‍💻 A Thread 🧵👇


Prerak Mittal 已轉發

Audited an OSS product running on a Synack target, found over 20 vulns (0 days) including RCE, XXE, path traversal, auth bypass, and many XSS. Hoping to summarize in a blog post once they (and the product) can be safely disclosed. I love this stuff!

pmnh_'s tweet image. Audited an OSS product running on a Synack target, found over 20 vulns (0 days) including RCE, XXE, path traversal, auth bypass, and many XSS. Hoping to summarize in a blog post once they (and the product) can be safely disclosed. I love this stuff!

Prerak Mittal 已轉發

In past 2 months I wrote a lot about Smart Contract and Blockchain security. Here is the recap of @SolidityScan blogs. RT if you find it valuable :) A thread 1/12 1) Access Control vulnerabilities in Smart contracts blog.solidityscan.com/access-control… #security #smartcontracts


Prerak Mittal 已轉發

Add to your list #SQL #injection payload #BugBounty 1%27/**/%256fR/**/50%2521%253D22%253B%2523 == "0\"XOR(if(now()=sysdate(),sleep(9),0))XOR\"Z", === query=login&username=rrr';SELECT PG_SLEEP(5)--&password=rr&submit=Login == ' AND (SELECT 8871 FROM (SELECT(SLEEP(5)))uZxz)


Prerak Mittal 已轉發

-> On Web App UI 403 Forbidden to low-level user to access this endpoint: /admin/users -> I got API Endpoint : /API/users/v1/users -> 403 Forbidden -> API Endpoint on BurpJSLinkFinder : /API/users/v1/users/basic -> Full organization users email,firstname,lastname,role disclose

Fozisimi143's tweet image. -> On Web App UI 403 Forbidden to low-level user to access this endpoint: /admin/users
-> I got API Endpoint : /API/users/v1/users -> 403 Forbidden
-> API Endpoint on BurpJSLinkFinder : /API/users/v1/users/basic -> Full organization users email,firstname,lastname,role disclose

Prerak Mittal 已轉發

Perhaps you already know what IDORs are. They are very COMMON. But did you know about Second Order IDORs? If not, @ozgur_bbh wrote an AWESOME blog about this lesser known class of bugs Read it👇 ozguralp.medium.com/a-less-known-a… #bugbounty #bugbountytips #infosec #CyberSecurity

payloadartist's tweet image. Perhaps you already know what IDORs are.

They are very COMMON.

But did you know about Second Order IDORs?

If not, @ozgur_bbh wrote an AWESOME blog about this lesser known class of bugs

Read it👇

ozguralp.medium.com/a-less-known-a…

#bugbounty #bugbountytips #infosec #CyberSecurity
payloadartist's tweet image. Perhaps you already know what IDORs are.

They are very COMMON.

But did you know about Second Order IDORs?

If not, @ozgur_bbh wrote an AWESOME blog about this lesser known class of bugs

Read it👇

ozguralp.medium.com/a-less-known-a…

#bugbounty #bugbountytips #infosec #CyberSecurity

Loading...

Something went wrong.


Something went wrong.