#hackertips search results

[HACKER TIP] Top Burp Suite Extensions: 1- Turbo Intruder 2- J2EEScan 3- Autorize 4- Active Scan++ 5- Collaborator Everywhere 6- Param Miner 7- JSON Beautifier 8- Upload Scanner 9- Freddy 10- Logger++ #bugbounty #hackertips #BurpSuite

YogoshaOfficial's tweet image. [HACKER TIP] Top Burp Suite Extensions:
1- Turbo Intruder
2- J2EEScan
3- Autorize
4- Active Scan++
5- Collaborator Everywhere
6- Param Miner
7- JSON Beautifier
8- Upload Scanner
9- Freddy
10- Logger++
#bugbounty #hackertips #BurpSuite

[HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character. example: redirect_to=////evil%E3%80%82com  #bugbounty #hackertips #openredirect

YogoshaOfficial's tweet image. [HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character.
example:
redirect_to=////evil%E3%80%82com 
#bugbounty #hackertips #openredirect

[HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing EXEC xp_cmdshell 'Command Option'; Thanks @H4MA_TN for the tip 🙏 #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing 
EXEC xp_cmdshell 'Command Option';
Thanks @H4MA_TN for the tip 🙏
#bugbounty #hackertips

#HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy

drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy
drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy
drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy

Silly #HackerTips - you know those spare SMD parts you pull off boards? Micro SD holders! You can see what's in there well enough for it to be a useful resource at times.

drtune's tweet image. Silly #HackerTips - you know those spare SMD parts you pull off boards? Micro SD holders! You can see what's in there well enough for it to be a useful resource at times.

Hacker tip: the tiny soy sauce sushi plates are perfect for holding screws and small parts when doing a hardware hack or modification #HackerTips

1o57's tweet image. Hacker tip: the tiny soy sauce sushi plates are perfect for holding screws and small parts when doing a hardware hack or modification #HackerTips

#HackerTips - I suspected this would be awesome and not disappointed; $3 footswitch plus three croc clips (normally open/closed). SO HANDY for power cycling board, hitting reset, triggering scope, etc when hands full. Camera trigger & "paste txt to app" sound good too. Cheap!

drtune's tweet image. #HackerTips - I suspected this would be awesome and not disappointed; $3 footswitch plus three croc clips (normally open/closed). SO HANDY for power cycling board, hitting reset, triggering scope, etc when hands full. Camera trigger & "paste txt to app" sound good too. Cheap!

[HACKER TIP] If you came across SSTI in a go application, it is worth trying the following payload {{define "T1"}}<script>alert(1)</script>{{end}} {{template "T1"}} to achieve XSS and bypass HTML sanitization. #bugbounty #hackertips #XSS

YogoshaOfficial's tweet image. [HACKER TIP] If you came  across SSTI in a go application, it is worth trying the following payload
{{define &quot;T1&quot;}}&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;{{end}} {{template &quot;T1&quot;}}
to achieve XSS and bypass HTML sanitization.
#bugbounty #hackertips #XSS

Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections. Exp: HEAD Request to /login username=foo&password=foo #bugbounty #hackertips

YogoshaOfficial's tweet image. Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections.

Exp: HEAD Request to /login username=foo&amp;amp;password=foo

#bugbounty #hackertips

[HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML. #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML.

#bugbounty #hackertips

Looking for IDOR but API return 403 forbidden, try to send wildcard as user id '{"id":"*"}' or use the ID in array '{"id":[123]}'. #bugbounty #hackertips @TnMch_

YogoshaOfficial's tweet image. Looking for IDOR but API return 403 forbidden, try to send wildcard as user id &apos;{&quot;id&quot;:&quot;*&quot;}&apos; or use the ID in array &apos;{&quot;id&quot;:[123]}&apos;. #bugbounty #hackertips 
@TnMch_

When compiling tools (like aircrack-ng), it's important to color coordinate with the game you're playing to pass the time. #HackerTips

ktneely's tweet image. When compiling tools (like aircrack-ng), it&apos;s important to color coordinate with the game you&apos;re playing to pass the time.  #HackerTips

There isn't just one way to authenticate with an API! Find old versions, and if there is /api/v3/ ,check if /api/v1/ also exists > It could be vulnerable. #bugbounty #hackertips @TnMch_

YogoshaOfficial's tweet image. There isn&apos;t just one way to authenticate with an API! Find old versions, and if there is /api/v3/ ,check if /api/v1/ also exists &amp;gt; It could be vulnerable. #bugbounty #hackertips
@TnMch_

[HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions. @BelkahlaAhmed1 #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions.

@BelkahlaAhmed1 

#bugbounty #hackertips

[HACKER TIP] If you find a blind error based XXE but out-of-band interactions are blocked you can use a system DTD and redefine an entity that is declared within that DTD. #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] If you find a blind error based XXE but out-of-band interactions are blocked you can use  a system DTD and redefine an entity that is declared within that DTD.
#bugbounty #hackertips

Bug bounty tips : user enumeration, internal IP disclosure, full path disclosure are not so dangerous by themselves but if you combine them with another issue > jackpot ! 🤑 #hackertips #incrowdwetrust #bugbounty

YogoshaOfficial's tweet image. Bug bounty tips : user enumeration, internal IP disclosure, full path disclosure are not so dangerous by themselves but if you combine them with another issue &amp;gt; jackpot ! 🤑 #hackertips #incrowdwetrust #bugbounty

[HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities. #bugbounty #hackertips #XSS

YogoshaOfficial's tweet image. [HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities.
#bugbounty #hackertips #XSS

[HACKER TIP] Don’t forget to test if “null” origin is reflected in Access-Control-Allow-Origin header since some developers always use it for local development and tests. You can obtain the null origin and exploit it using a sandboxed iframe. 🚀 #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] Don’t forget to test if “null” origin is reflected in Access-Control-Allow-Origin header since some developers always use it for local development and tests. You can obtain the null origin and exploit it using a sandboxed iframe.  🚀 

#bugbounty #hackertips

When testing the password reset function, be sure to add your email with the victim's email, it can send you both the verification reset code which makes account takeover possible. exp : {"email":["[email protected]","[email protected]"]} #bugbounty #hackertips @TnMch_

YogoshaOfficial's tweet image. When testing the password reset function, be sure to add your email with the victim&apos;s email, it can send you both the verification reset code which makes account takeover possible.

exp : {&quot;email&quot;:[&quot;victim@gmail.com&quot;,&quot;your_email@gmail.com&quot;]}
#bugbounty #hackertips
@TnMch_

🔍 It’s not just about finding vulnerabilities, it’s about reporting them right. Check out the 10 rules every hacker should follow to keep their reputation strong and boost valid find rates. 💥 Learn, apply, and climb the ranks. #BugBounty #HackerTips #CyScopeCommunity


14/ Follow me @Hoesenbug for tactical bug bounty breakdowns. More threads like this. Real hacks. Real lessons. #Hoesenbug #HackerTips #BugBounty


Want to learn hacking but ignoring networking? That’s like wanting to be a chef but hating fire.🔥 Start here: – TCP/IP – Ports – OSI Model – Wireshark Don’t skip this. #Networking #HackerTips #TryHackMe #CyberSecurity

SeamSikderNahid's tweet image. Want to learn hacking but ignoring networking?
That’s like wanting to be a chef but hating fire.🔥
Start here:
– TCP/IP
– Ports
– OSI Model
– Wireshark

Don’t skip this.
#Networking #HackerTips #TryHackMe #CyberSecurity

🔓 7 unexpected ways hackers can access your account — and you might not even see them coming. Stay one step ahead! #CyberSecurity #OnlineSafety #HackerTips #ITSupportMelbourne #Cybersecurity #ITSupportforAustralianBusinesses #ITConsultation


Time to pivot our threat modeling and user education strategies 🔐 6/ Protect yourself: Don’t download "fixes" from unverified sources Check URLs closely Use sandboxing for suspicious links Educate non-tech users — they’re the prime targets #CyberAware #HackerTips


Don’t just scan with Nmap. Use flags! 𝚗𝚖𝚊𝚙 -𝙰 -𝚃𝟺 𝚝𝚊𝚛𝚐𝚎𝚝.𝚌𝚘𝚖 gives OS, services, and scripts. #KaliLinux #Nmap #HackerTips #kalilinuxin #bugbountytips


Elevate your security game! Combining a strong username & password with multi-factor authentication is your best defense against cyber threats. Stay one step ahead—secure access, guaranteed. 💻📱 #Cybersecurity #HackerTips #StaySecure"

Harri_Devalle__'s tweet image. Elevate your security game! Combining a strong username &amp;amp; password with multi-factor authentication is your best defense against cyber threats. Stay one step ahead—secure access, guaranteed. 💻📱 #Cybersecurity #HackerTips #StaySecure&quot;

9/11 For top cybersecurity tips and news on how to protect your digital space, follow @Eth1calHackrZ. Let’s stay ahead of the game and secure our future online! 🔒🌐 #CyberSecurity #DigitalProtection #HackerTips #StaySafeOnline


10. Join Travel Hacking Communities 🤝 - Learn from other travel hackers and stay updated on the latest deals and strategies. 📚💡 #TravelCommunity #HackerTips


Social engineering: the human element of hacking. Never underestimate its power. #HackerTips #CyberSecurity


[HACKER TIP] Top Burp Suite Extensions: 1- Turbo Intruder 2- J2EEScan 3- Autorize 4- Active Scan++ 5- Collaborator Everywhere 6- Param Miner 7- JSON Beautifier 8- Upload Scanner 9- Freddy 10- Logger++ #bugbounty #hackertips #BurpSuite

YogoshaOfficial's tweet image. [HACKER TIP] Top Burp Suite Extensions:
1- Turbo Intruder
2- J2EEScan
3- Autorize
4- Active Scan++
5- Collaborator Everywhere
6- Param Miner
7- JSON Beautifier
8- Upload Scanner
9- Freddy
10- Logger++
#bugbounty #hackertips #BurpSuite

[HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character. example: redirect_to=////evil%E3%80%82com  #bugbounty #hackertips #openredirect

YogoshaOfficial's tweet image. [HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character.
example:
redirect_to=////evil%E3%80%82com 
#bugbounty #hackertips #openredirect

[HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing EXEC xp_cmdshell 'Command Option'; Thanks @H4MA_TN for the tip 🙏 #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing 
EXEC xp_cmdshell &apos;Command Option&apos;;
Thanks @H4MA_TN for the tip 🙏
#bugbounty #hackertips

[HACKER TIP] If you came across SSTI in a go application, it is worth trying the following payload {{define "T1"}}<script>alert(1)</script>{{end}} {{template "T1"}} to achieve XSS and bypass HTML sanitization. #bugbounty #hackertips #XSS

YogoshaOfficial's tweet image. [HACKER TIP] If you came  across SSTI in a go application, it is worth trying the following payload
{{define &quot;T1&quot;}}&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;{{end}} {{template &quot;T1&quot;}}
to achieve XSS and bypass HTML sanitization.
#bugbounty #hackertips #XSS

Looking for IDOR but API return 403 forbidden, try to send wildcard as user id '{"id":"*"}' or use the ID in array '{"id":[123]}'. #bugbounty #hackertips @TnMch_

YogoshaOfficial's tweet image. Looking for IDOR but API return 403 forbidden, try to send wildcard as user id &apos;{&quot;id&quot;:&quot;*&quot;}&apos; or use the ID in array &apos;{&quot;id&quot;:[123]}&apos;. #bugbounty #hackertips 
@TnMch_

Hacker tip: the tiny soy sauce sushi plates are perfect for holding screws and small parts when doing a hardware hack or modification #HackerTips

1o57's tweet image. Hacker tip: the tiny soy sauce sushi plates are perfect for holding screws and small parts when doing a hardware hack or modification #HackerTips

[HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions. @BelkahlaAhmed1 #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions.

@BelkahlaAhmed1 

#bugbounty #hackertips

[HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML. #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML.

#bugbounty #hackertips

Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections. Exp: HEAD Request to /login username=foo&password=foo #bugbounty #hackertips

YogoshaOfficial's tweet image. Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections.

Exp: HEAD Request to /login username=foo&amp;amp;password=foo

#bugbounty #hackertips

Have you every wondered which sections to put in your reports? Check out our best practice of the week by @gwendallecoguic 👇 #incrowdwetrust #bugbounty #hackertips

YogoshaOfficial's tweet image. Have you every wondered which sections to put in your reports? Check out our best practice of the week by @gwendallecoguic 👇 #incrowdwetrust #bugbounty #hackertips

Silly #HackerTips - you know those spare SMD parts you pull off boards? Micro SD holders! You can see what's in there well enough for it to be a useful resource at times.

drtune's tweet image. Silly #HackerTips - you know those spare SMD parts you pull off boards? Micro SD holders! You can see what&apos;s in there well enough for it to be a useful resource at times.

[HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities. #bugbounty #hackertips #XSS

YogoshaOfficial's tweet image. [HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities.
#bugbounty #hackertips #XSS

if you find “403 Forbidden” while accessing a specific path, try using ";" which can lead to bypassing the restrictions. Exp : site.com/admin;/ #bugbounty #hackertips @TnMch_

YogoshaOfficial's tweet image. if you find “403 Forbidden” while accessing a specific path, try using &quot;;&quot; which can lead to bypassing the restrictions.
Exp : site.com/admin;/
#bugbounty #hackertips
@TnMch_

Bug bounty tips : user enumeration, internal IP disclosure, full path disclosure are not so dangerous by themselves but if you combine them with another issue > jackpot ! 🤑 #hackertips #incrowdwetrust #bugbounty

YogoshaOfficial's tweet image. Bug bounty tips : user enumeration, internal IP disclosure, full path disclosure are not so dangerous by themselves but if you combine them with another issue &amp;gt; jackpot ! 🤑 #hackertips #incrowdwetrust #bugbounty

There isn't just one way to authenticate with an API! Find old versions, and if there is /api/v3/ ,check if /api/v1/ also exists > It could be vulnerable. #bugbounty #hackertips @TnMch_

YogoshaOfficial's tweet image. There isn&apos;t just one way to authenticate with an API! Find old versions, and if there is /api/v3/ ,check if /api/v1/ also exists &amp;gt; It could be vulnerable. #bugbounty #hackertips
@TnMch_

#HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy

drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy
drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy
drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy

[HACKER TIP] If you find a blind error based XXE but out-of-band interactions are blocked you can use a system DTD and redefine an entity that is declared within that DTD. #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] If you find a blind error based XXE but out-of-band interactions are blocked you can use  a system DTD and redefine an entity that is declared within that DTD.
#bugbounty #hackertips

Best practice of the week : remember that duplicates can be paid when you provide more details than the original report ! #hackertips #bugbounty #incrowdwetrust

YogoshaOfficial's tweet image. Best practice of the week : remember that duplicates can be paid when you provide more details than the original report ! #hackertips #bugbounty #incrowdwetrust

When testing the password reset function, be sure to add your email with the victim's email, it can send you both the verification reset code which makes account takeover possible. exp : {"email":["[email protected]","[email protected]"]} #bugbounty #hackertips @TnMch_

YogoshaOfficial's tweet image. When testing the password reset function, be sure to add your email with the victim&apos;s email, it can send you both the verification reset code which makes account takeover possible.

exp : {&quot;email&quot;:[&quot;victim@gmail.com&quot;,&quot;your_email@gmail.com&quot;]}
#bugbounty #hackertips
@TnMch_

#HackerTips - I suspected this would be awesome and not disappointed; $3 footswitch plus three croc clips (normally open/closed). SO HANDY for power cycling board, hitting reset, triggering scope, etc when hands full. Camera trigger & "paste txt to app" sound good too. Cheap!

drtune's tweet image. #HackerTips - I suspected this would be awesome and not disappointed; $3 footswitch plus three croc clips (normally open/closed). SO HANDY for power cycling board, hitting reset, triggering scope, etc when hands full. Camera trigger &amp;amp; &quot;paste txt to app&quot; sound good too. Cheap!

Loading...

Something went wrong.


Something went wrong.


United States Trends