r0g3rmr3n00b's profile picture. Proud Indian

mssoffsec

@r0g3rmr3n00b

Proud Indian

mssoffsec reposted

I asked 10+ top bug hunters who made over $500k+ about their secrets. Here’s what they said: 1. They work insanely hard (280+ hrs/month) even after earning millions. 2. They master 1–3 programs deeply. 3. Speed matters. Never break your momentum. 1/n


mssoffsec reposted

Another 4-digit reward with @0x_rood ! ❤️ 1) Got a new asset alert from @profundisio 2) Found an “authorized users only” panel 3) Checked JS files and discovered an API key 4) Mapped API endpoints and confirmed the key worked 5) Was able to read, upload, and delete files +…

badcrack3r's tweet image. Another 4-digit reward with @0x_rood ! ❤️

1) Got a new asset alert from @profundisio
2) Found an “authorized users only” panel
3) Checked JS files and discovered an API key
4) Mapped API endpoints and confirmed the key worked
5) Was able to read, upload, and delete files +…

mssoffsec reposted

Q1, Q2 and Q3 2025 were fine, Q1 2025 ~$100K Q2 2025 ~$100K Q3 2025 ~$115K Q4 2025 goal is $50K or more, We will see👀 Working_On_it I need more focus and energy, New Ideas and Strategy also. #BugBounty #HackerOne #BugBountyHunter

TeslaTheGod's tweet image. Q1, Q2 and Q3 2025 were fine,

Q1 2025  ~$100K 
Q2 2025  ~$100K 
Q3 2025  ~$115K 

Q4 2025 goal is $50K or more,

We will see👀
Working_On_it

I need more focus and energy, 
New Ideas and Strategy also. 

#BugBounty #HackerOne #BugBountyHunter

mssoffsec reposted

How to extract subdomains from an ASN using dnsx! ⌨️ echo <ANS> | dnsx -silent -ro -ptr (🔗 link to dnsx in the comments) #hackwithautomation #cybersecurity #hacking #bugbounty #opensource


mssoffsec reposted

I LOVE TruffleHog browser extension 💣💣💣 Simply just browsing the web and got a serious bug without even trying 😎 I just got an admin on a government website 😆

chux13786509's tweet image. I LOVE TruffleHog browser extension 💣💣💣
Simply just browsing the web and got a serious bug without even trying 😎
I just got an admin on a government website 😆
chux13786509's tweet image. I LOVE TruffleHog browser extension 💣💣💣
Simply just browsing the web and got a serious bug without even trying 😎
I just got an admin on a government website 😆
chux13786509's tweet image. I LOVE TruffleHog browser extension 💣💣💣
Simply just browsing the web and got a serious bug without even trying 😎
I just got an admin on a government website 😆

mssoffsec reposted

Bug bounty life tips: - Triage downgrades your report? Ignore it, comments won’t save you. - Company says “aware of this issue”? Skip, no one helps. - CSRF and IDOR = same (in their eyes)? Skip, you’re “wrong.” - They fix your sqli while program suspended? Skip, you lose. Skip..


mssoffsec reposted

I submitted 5 critical reports in 2 hours due to 2 bugs. 1- The first mistake is when you add slach at the end it will bypass authentication - /api/x/x --- > 401 Unauthorized - /api/x/x/ -- > 200 Ok (2/1) #bugbounty #hackerone

00xalr's tweet image. I submitted 5 critical reports in 2 hours due to 2 bugs.

1- The first mistake is when you add slach at the end it will bypass authentication

 - /api/x/x --- &amp;gt; 401 Unauthorized
 - /api/x/x/ -- &amp;gt; 200 Ok

(2/1)
#bugbounty #hackerone

mssoffsec reposted

I've made over 100k on SSRF vulnerabilities. They aren't always as simple as pointing it at localhost or AWS Metadata service. Here are some tricks I've picked up over the past 5 years of web app testing:

Rhynorater's tweet image. I&apos;ve made over 100k on SSRF vulnerabilities.

They aren&apos;t always as simple as pointing it at localhost or AWS Metadata service. 

Here are some tricks I&apos;ve picked up over the past 5 years of web app testing:

mssoffsec reposted

follow @hacker_ (and @boringmattress) top:

I've made $500k+ from SSRF vulnerabilities. Here are my tricks:

hacker_'s tweet image. I&apos;ve made $500k+ from SSRF vulnerabilities.

Here are my tricks:


mssoffsec reposted

API-specific wordlists for fuzzing hidden routes & endpoints🚀 wordlists-cdn.assetnote.io/data/automated/

harshleenchawl2's tweet image. API-specific wordlists for fuzzing hidden routes &amp;amp; endpoints🚀
wordlists-cdn.assetnote.io/data/automated/

mssoffsec reposted

150$ - Info Disclosure on GoPro!⚡️ 1. In-Depth Subd Enum. 2. cat allsubs.txt | httpx -mc 200 > working.txt 3. nmap -iL working.txt -p0-65535 -oN fullscan.txt 4. dirsearch -l nmap.txt -w <wordlist> -x <status codes> -r -e <extensions> 5. Found .txt file #bugbountytip #bugbounty

rahul0x01's tweet image. 150$ - Info Disclosure on GoPro!⚡️

1. In-Depth Subd Enum.
2. cat allsubs.txt | httpx -mc 200 &amp;gt; working.txt
3. nmap -iL working.txt -p0-65535 -oN fullscan.txt
4. dirsearch -l nmap.txt -w &amp;lt;wordlist&amp;gt; -x &amp;lt;status codes&amp;gt; -r -e &amp;lt;extensions&amp;gt;
5. Found .txt file

#bugbountytip #bugbounty

mssoffsec reposted

Unauthenticated Access to Sensitive Customer Data via Google Dorking How I did it: - During recon, I used the dork: site:*.target.* "date of birth" ext:pdf - Found a PDF file exposing customer data. - Noticed an ID in the URL. - By changing the ID, I could access other data.

mooo_sec's tweet image. Unauthenticated Access to Sensitive Customer Data via Google Dorking

How I did it:

- During recon, I used the dork:
  site:*.target.* &quot;date of birth&quot; ext:pdf
- Found a PDF file exposing customer data.
- Noticed an ID in the URL.
- By changing the ID, I could access other data.
mooo_sec's tweet image. Unauthenticated Access to Sensitive Customer Data via Google Dorking

How I did it:

- During recon, I used the dork:
  site:*.target.* &quot;date of birth&quot; ext:pdf
- Found a PDF file exposing customer data.
- Noticed an ID in the URL.
- By changing the ID, I could access other data.
mooo_sec's tweet image. Unauthenticated Access to Sensitive Customer Data via Google Dorking

How I did it:

- During recon, I used the dork:
  site:*.target.* &quot;date of birth&quot; ext:pdf
- Found a PDF file exposing customer data.
- Noticed an ID in the URL.
- By changing the ID, I could access other data.
mooo_sec's tweet image. Unauthenticated Access to Sensitive Customer Data via Google Dorking

How I did it:

- During recon, I used the dork:
  site:*.target.* &quot;date of birth&quot; ext:pdf
- Found a PDF file exposing customer data.
- Noticed an ID in the URL.
- By changing the ID, I could access other data.

mssoffsec reposted

12 API hacking bug bounty tips you must try on your target! 😎 🧵 👇

intigriti's tweet image. 12 API hacking bug bounty tips you must try on your target! 😎

🧵 👇

mssoffsec reposted

🔁 File uploads are almost everywhere... Sometimes, a simple validation mistake can result in a high-severity finding (such as RCEs) 🤠 In our technical article, we documented a few cool tricks you could try next time you're testing a file upload feature! Link in next post! 👇

intigriti's tweet image. 🔁 File uploads are almost everywhere...

Sometimes, a simple validation mistake can result in a high-severity finding (such as RCEs) 🤠

In our technical article, we documented a few cool tricks you could try next time you&apos;re testing a file upload feature!

Link in next post! 👇

mssoffsec reposted

OSINT-Advanced Searching🔍📝 github.com/The-Osint-Tool…

harshleenchawl2's tweet image. OSINT-Advanced Searching🔍📝
github.com/The-Osint-Tool…

mssoffsec reposted

redacted[.]com/ --> [302]❌ redacted[.]com/app/api/doc/ --> [200 OK] ✅ Bypassed the 302 and hit API doc gold! #bugbountytips #BugBounty

arshiyaiha's tweet image. redacted[.]com/ --&amp;gt; [302]❌
redacted[.]com/app/api/doc/ --&amp;gt; [200 OK] ✅
Bypassed the 302 and hit API doc gold!
 #bugbountytips  #BugBounty

mssoffsec reposted

Bug Bounty Tips (1/2) 1- Add users with different roles in your company to the system. 2- Log in as a low-authority user in the incognito tab and log in as a high-authority account in the normal tab for role isolation. #BugBounty #bugbountytips

ahmtbrt07's tweet image. Bug Bounty Tips (1/2)

1- Add users with different roles in your company to the system.

2- Log in as a low-authority user in the incognito tab and log in as a high-authority account in the normal tab for role isolation.

#BugBounty #bugbountytips

mssoffsec reposted

The best informative report 😋 i ever had #bugbounty

roohaa_n's tweet image. The best informative report 😋 i ever had 

#bugbounty

mssoffsec reposted

Try this out on your next target! Some more gold from the guys at @ctbbpodcast! 🔥

0xacb's tweet image. Try this out on your next target!

Some more gold from the guys at @ctbbpodcast! 🔥

mssoffsec reposted

~IDOR bypass techniques New video out too! youtu.be/JNvnCojTAvI #bugbounty

annonimous254z's tweet image. ~IDOR bypass techniques
New video out too! youtu.be/JNvnCojTAvI
#bugbounty
annonimous254z's tweet image. ~IDOR bypass techniques
New video out too! youtu.be/JNvnCojTAvI
#bugbounty
annonimous254z's tweet image. ~IDOR bypass techniques
New video out too! youtu.be/JNvnCojTAvI
#bugbounty
annonimous254z's tweet image. ~IDOR bypass techniques
New video out too! youtu.be/JNvnCojTAvI
#bugbounty

Loading...

Something went wrong.


Something went wrong.