r0g3rmr3n00b's profile picture. Proud Indian

mssoffsec

@r0g3rmr3n00b

Proud Indian

mssoffsec reposteó

Another 4-digit reward with @0x_rood ! ❤️ 1) Got a new asset alert from @profundisio 2) Found an “authorized users only” panel 3) Checked JS files and discovered an API key 4) Mapped API endpoints and confirmed the key worked 5) Was able to read, upload, and delete files +…

badcrack3r's tweet image. Another 4-digit reward with @0x_rood ! ❤️

1) Got a new asset alert from @profundisio
2) Found an “authorized users only” panel
3) Checked JS files and discovered an API key
4) Mapped API endpoints and confirmed the key worked
5) Was able to read, upload, and delete files +…

mssoffsec reposteó

Q1, Q2 and Q3 2025 were fine, Q1 2025 ~$100K Q2 2025 ~$100K Q3 2025 ~$115K Q4 2025 goal is $50K or more, We will see👀 Working_On_it I need more focus and energy, New Ideas and Strategy also. #BugBounty #HackerOne #BugBountyHunter

TeslaTheGod's tweet image. Q1, Q2 and Q3 2025 were fine,

Q1 2025  ~$100K 
Q2 2025  ~$100K 
Q3 2025  ~$115K 

Q4 2025 goal is $50K or more,

We will see👀
Working_On_it

I need more focus and energy, 
New Ideas and Strategy also. 

#BugBounty #HackerOne #BugBountyHunter

mssoffsec reposteó

How to extract subdomains from an ASN using dnsx! ⌨️ echo <ANS> | dnsx -silent -ro -ptr (🔗 link to dnsx in the comments) #hackwithautomation #cybersecurity #hacking #bugbounty #opensource


mssoffsec reposteó

I LOVE TruffleHog browser extension 💣💣💣 Simply just browsing the web and got a serious bug without even trying 😎 I just got an admin on a government website 😆

chux13786509's tweet image. I LOVE TruffleHog browser extension 💣💣💣
Simply just browsing the web and got a serious bug without even trying 😎
I just got an admin on a government website 😆
chux13786509's tweet image. I LOVE TruffleHog browser extension 💣💣💣
Simply just browsing the web and got a serious bug without even trying 😎
I just got an admin on a government website 😆
chux13786509's tweet image. I LOVE TruffleHog browser extension 💣💣💣
Simply just browsing the web and got a serious bug without even trying 😎
I just got an admin on a government website 😆

mssoffsec reposteó

Bug bounty life tips: - Triage downgrades your report? Ignore it, comments won’t save you. - Company says “aware of this issue”? Skip, no one helps. - CSRF and IDOR = same (in their eyes)? Skip, you’re “wrong.” - They fix your sqli while program suspended? Skip, you lose. Skip..


mssoffsec reposteó

I submitted 5 critical reports in 2 hours due to 2 bugs. 1- The first mistake is when you add slach at the end it will bypass authentication - /api/x/x --- > 401 Unauthorized - /api/x/x/ -- > 200 Ok (2/1) #bugbounty #hackerone

00xalr's tweet image. I submitted 5 critical reports in 2 hours due to 2 bugs.

1- The first mistake is when you add slach at the end it will bypass authentication

 - /api/x/x --- &amp;gt; 401 Unauthorized
 - /api/x/x/ -- &amp;gt; 200 Ok

(2/1)
#bugbounty #hackerone

mssoffsec reposteó

I've made over 100k on SSRF vulnerabilities. They aren't always as simple as pointing it at localhost or AWS Metadata service. Here are some tricks I've picked up over the past 5 years of web app testing:

Rhynorater's tweet image. I&apos;ve made over 100k on SSRF vulnerabilities.

They aren&apos;t always as simple as pointing it at localhost or AWS Metadata service. 

Here are some tricks I&apos;ve picked up over the past 5 years of web app testing:

mssoffsec reposteó

follow @hacker_ (and @boringmattress) top:

I've made $500k+ from SSRF vulnerabilities. Here are my tricks:

hacker_'s tweet image. I&apos;ve made $500k+ from SSRF vulnerabilities.

Here are my tricks:


mssoffsec reposteó

API-specific wordlists for fuzzing hidden routes & endpoints🚀 wordlists-cdn.assetnote.io/data/automated/

harshleenchawl2's tweet image. API-specific wordlists for fuzzing hidden routes &amp;amp; endpoints🚀
wordlists-cdn.assetnote.io/data/automated/

mssoffsec reposteó

150$ - Info Disclosure on GoPro!⚡️ 1. In-Depth Subd Enum. 2. cat allsubs.txt | httpx -mc 200 > working.txt 3. nmap -iL working.txt -p0-65535 -oN fullscan.txt 4. dirsearch -l nmap.txt -w <wordlist> -x <status codes> -r -e <extensions> 5. Found .txt file #bugbountytip #bugbounty

rahul0x01's tweet image. 150$ - Info Disclosure on GoPro!⚡️

1. In-Depth Subd Enum.
2. cat allsubs.txt | httpx -mc 200 &amp;gt; working.txt
3. nmap -iL working.txt -p0-65535 -oN fullscan.txt
4. dirsearch -l nmap.txt -w &amp;lt;wordlist&amp;gt; -x &amp;lt;status codes&amp;gt; -r -e &amp;lt;extensions&amp;gt;
5. Found .txt file

#bugbountytip #bugbounty

mssoffsec reposteó

Unauthenticated Access to Sensitive Customer Data via Google Dorking How I did it: - During recon, I used the dork: site:*.target.* "date of birth" ext:pdf - Found a PDF file exposing customer data. - Noticed an ID in the URL. - By changing the ID, I could access other data.

mooo_sec's tweet image. Unauthenticated Access to Sensitive Customer Data via Google Dorking

How I did it:

- During recon, I used the dork:
  site:*.target.* &quot;date of birth&quot; ext:pdf
- Found a PDF file exposing customer data.
- Noticed an ID in the URL.
- By changing the ID, I could access other data.
mooo_sec's tweet image. Unauthenticated Access to Sensitive Customer Data via Google Dorking

How I did it:

- During recon, I used the dork:
  site:*.target.* &quot;date of birth&quot; ext:pdf
- Found a PDF file exposing customer data.
- Noticed an ID in the URL.
- By changing the ID, I could access other data.
mooo_sec's tweet image. Unauthenticated Access to Sensitive Customer Data via Google Dorking

How I did it:

- During recon, I used the dork:
  site:*.target.* &quot;date of birth&quot; ext:pdf
- Found a PDF file exposing customer data.
- Noticed an ID in the URL.
- By changing the ID, I could access other data.
mooo_sec's tweet image. Unauthenticated Access to Sensitive Customer Data via Google Dorking

How I did it:

- During recon, I used the dork:
  site:*.target.* &quot;date of birth&quot; ext:pdf
- Found a PDF file exposing customer data.
- Noticed an ID in the URL.
- By changing the ID, I could access other data.

mssoffsec reposteó

12 API hacking bug bounty tips you must try on your target! 😎 🧵 👇

intigriti's tweet image. 12 API hacking bug bounty tips you must try on your target! 😎

🧵 👇

mssoffsec reposteó

🔁 File uploads are almost everywhere... Sometimes, a simple validation mistake can result in a high-severity finding (such as RCEs) 🤠 In our technical article, we documented a few cool tricks you could try next time you're testing a file upload feature! Link in next post! 👇

intigriti's tweet image. 🔁 File uploads are almost everywhere...

Sometimes, a simple validation mistake can result in a high-severity finding (such as RCEs) 🤠

In our technical article, we documented a few cool tricks you could try next time you&apos;re testing a file upload feature!

Link in next post! 👇

mssoffsec reposteó

OSINT-Advanced Searching🔍📝 github.com/The-Osint-Tool…

harshleenchawl2's tweet image. OSINT-Advanced Searching🔍📝
github.com/The-Osint-Tool…

mssoffsec reposteó

redacted[.]com/ --> [302]❌ redacted[.]com/app/api/doc/ --> [200 OK] ✅ Bypassed the 302 and hit API doc gold! #bugbountytips #BugBounty

arshiyaiha's tweet image. redacted[.]com/ --&amp;gt; [302]❌
redacted[.]com/app/api/doc/ --&amp;gt; [200 OK] ✅
Bypassed the 302 and hit API doc gold!
 #bugbountytips  #BugBounty

mssoffsec reposteó

Bug Bounty Tips (1/2) 1- Add users with different roles in your company to the system. 2- Log in as a low-authority user in the incognito tab and log in as a high-authority account in the normal tab for role isolation. #BugBounty #bugbountytips

ahmtbrt07's tweet image. Bug Bounty Tips (1/2)

1- Add users with different roles in your company to the system.

2- Log in as a low-authority user in the incognito tab and log in as a high-authority account in the normal tab for role isolation.

#BugBounty #bugbountytips

mssoffsec reposteó

The best informative report 😋 i ever had #bugbounty

roohaa_n's tweet image. The best informative report 😋 i ever had 

#bugbounty

mssoffsec reposteó

Try this out on your next target! Some more gold from the guys at @ctbbpodcast! 🔥

0xacb's tweet image. Try this out on your next target!

Some more gold from the guys at @ctbbpodcast! 🔥

mssoffsec reposteó

~IDOR bypass techniques New video out too! youtu.be/JNvnCojTAvI #bugbounty

annonimous254z's tweet image. ~IDOR bypass techniques
New video out too! youtu.be/JNvnCojTAvI
#bugbounty
annonimous254z's tweet image. ~IDOR bypass techniques
New video out too! youtu.be/JNvnCojTAvI
#bugbounty
annonimous254z's tweet image. ~IDOR bypass techniques
New video out too! youtu.be/JNvnCojTAvI
#bugbounty
annonimous254z's tweet image. ~IDOR bypass techniques
New video out too! youtu.be/JNvnCojTAvI
#bugbounty

mssoffsec reposteó

A simple open redirect can wreak havoc. Simple open redirect -> misconfigured OAuth authentication flow -> privilege abuse using Amazon Cognito token #bugbounty #bugcrowd

erickfernandox's tweet image. A simple open redirect can wreak havoc.

Simple open redirect -&amp;gt; misconfigured OAuth authentication flow -&amp;gt; privilege abuse using Amazon Cognito token

#bugbounty #bugcrowd

Loading...

Something went wrong.


Something went wrong.