Web Application Security & Bug Bounty (Methodology, Reconnaissance, Vulnerabilities, Reporting)
Hello Folks , Hope everyone is doing good. This blog is basically for Web Security Methodology (WSM).
Have you read my last post regarding “Bug Bounty Methodology” ? If you missed it go to this BBM link https://medium.com/@infosecsanyam/bug-bounty-hunting-methodology-toolkit-tips-tricks-blogs-ef6542301c65
Now this time i will share methodology for Web Application Security Assessment from beginning to end (Recon to Reporting/ R&R) . Try to cover most of the vulnerabilities links for web application security.
Methodology of Application Vulnerability Assessment & Pen-testing
Defining a Scope
Reconnaissance
Manual Assessment (Web Security Vulnerabilities)
Reports
Defining a Scope :
Each bug bounty or Web Security Project has a “scope”, or in other words, a section of a Scope of Project ,websites of bounty program’s details that will describe what type of security vulnerabilities a program is interested in receiving, where a researcher is allowed to test and what type of testing is permitted. On Bug-crowd, a bounty’s scope can be found in the “Program Details” bounty brief section of a program page. In your web application project has give the scope which websites , subdomains, api’s links for assessment.
Reconnaissance:
Therefore I will not be explaining how to test for vulnerabilities, but rather where to test for them & the tools you can use. This is mainly just a general overview of how someone would map out a target site and efficiently perform reconnaissance to gain as much info on the site as possible before beginning their audit.Recon is an essential element of any penetration testing.
For Finding Web Security Vulnerabilities are not very simple . When you’re taking part in a bug bounty program, you’re competing against both the security of the site, and also against the thousands of other people who are taking part in the program. For this reason, it’s important to think critically.
This is why passive and active reconnaissance is especially important for Scope, as you need to look a lot deeper than you would in a regular penetration test.
Sometimes I forgot to do That and Shit happens Submitting things that aren’t within scope of the bounty program, tells the people running the program that you haven’t properly read the terms, and it will lead to them not taking your future reports seriously. I mean Seriously
Start a Reconnaissance
Subdomain Finding :
4. https://crt.sh/?q=%25taregt.com
Github Open Source tools for Subdomain Finding :-
- https://bitbucket.org/LaNMaSteR53/recon-ng
- https://github.com/michenriksen/aquatone
- https://github.com/aboul3la/Sublist3r
- https://github.com/rbsec/dnscan
- https://github.com/Cleveridge/cleveridge-subdomain-scanner
After getting all sub-domains we found two methods to scan an ip’s, ports and Services:
1. Masscan can also help https://github.com/robertdavidgraham/masscan
2. Aquatone : https://github.com/michenriksen/aquatone
3. Nmap
Also Just don’t get limited to Subdomains Try extracting vhosts 🙂 tools like
- https://pentest-tools.com/information-gathering/find-virtual-hosts
- https://github.com/jobertabma/virtual-host-discovery
- https://github.com/ChrisTruncer/EyeWitness 🙂
- httpscreenshot https://github.com/breenmachine/httpscreenshot/
- WAF (+ WAF type) — https://github.com/EnableSecurity/wafw00f
- https://github.com/danielmiessler/SecLists
- https://github.com/yasinS/sandcastle
- https://digi.ninja/projects/bucket_finder.php
Also Don’t forget your best friend Google :p Use google Dorks U can make your own or use make by others 😉
Try it out
- https://pentest-tools.com/information-gathering/google-hacking
- https://github.com/1N3/Goohak/
- https://github.com/ZephrFish/GoogD0rker/
Google Dorks :
site:target.com -www
site:target.com intitle:”test” -support
site:target.com ext:php | ext:html
site:subdomain.target.com
site:target.com inurl:auth
site:target.com inurl:dev
Information Gathering Part
1. Whois Information
2. Subdomains
3. Dir info
4. S3 Buckets
5. social accounts
6. API Endpoints
7. emails
8. Vhosts
9. Backend IP address
10. Open Ports / Services running
11. Service version info (if applicable)
12. server banners
13. directory listings
14. presence security headers
Make sure to spend as much time as possible performing recon, until you have a pretty good feel of how the site operates,
There are even occasions where passive recon can lead to some important information Disclosure. i.e. searching github or pastebin for the company name and stumbling across some random source that ended up online after some sloppy developer wrote it.
For that I would prefer
- https://github.com/1N3/Sn1per (for web)
- https://github.com/michenriksen/gitrob (for github)
- https://github.com/dxa4481/truffleHog
- https://github.com/IOActive/RepoSsessed
- https://github.com/anshumanbh/git-all-secrets
Don’t forget to look deep into Js files well manually you will love it But time saving is the goal so try using tools like
1 https://github.com/jobertabma/relative-url-extractor
To look for older content that can give u ideas of site structure or maybe vulnerable endpoints 😉 For that use
Maybe reverse whois lookup will help to discover more potential targets but make sure that they are in scope
1. http://viewdns.info/reversewhois/?q=
Alright, so then there’s this thing called PunkSpider. (https://www.punkspider.org) “It is a global web application vulnerability search engine. Don’t get too excited though.
Web Application Vulnerabilities & Bug Bounty Reference
A list of bug bounty / web app security write-up that is categorized by the bug nature,
1 Sql Injection :
SQL injection is a kind of injection vulnerability in which the attacker tries to inject arbitrary pieces of malicious data(Code) into the input fields of an application, which, when processed by the application, causes that data to be executed as a piece of code by the back end SQL server, thereby giving undesired results which the developer of the application did not anticipate.
List of Database
- MySQL(Open source),
- MSSQL,
- MS-ACCESS,
- Oracle,
- Postgre SQL(open source),
- SQLite,
Type of SQL Injection
- In Band
- Out of Band
- Blind SQLI
SQLI Exploitation Technique
- Error Based Exploitation
- Union Based Exploitation
- Boolean Based Exploitation
- Time Based Delay Exploitation
- Out of Band Exploitation
Try to Identify- where the application interact with DB
- Authentication Page
- Search Fields
- Post Fields
- Get Fields
- HTTP Header
- Cookie
Based on the response received from the server
Error-based SQL injections
- Union Query Type
- Double Query Injection
Blind SQL Injections
- Boolean-based blind injections.
- Time based blind injections
Sql Injection Practice Lab
1. http://leettime.net/sqlninja.com/
3. http://www.sqlinjection.net/
5. https://github.com/Audi-1/sqli-labs
Tutorials
1. https://www.exploit-db.com/
2. https://www.hackingarticles.in/
4. http://breakthesecurity.cysecurity.org/
5. http://lastc0de.blogspot.com/2013/07/tutorial-sql-injection-manual.html
SQL Injection Bug Bounty Writeups Written by ngalongc & @arushsinghania this is inspired by https://github.com/djadmin/awesome-bug-bounty:-
- SQL injection in WordPress Plugin Huge IT Video Gallery in Uber by glc
- SQL Injection on sctrack.email.uber.com.cn by Orange Tsai
- Yahoo — Root Access SQL Injection — tw.yahoo.com by Brett Buerhaus
- Multiple vulnerabilities in a WordPress plugin at drive.uber.com by Abood Nour (syndr0me)
- GitHub Enterprise SQL Injection by Orange
Cross Site Scripting Tutorial & Pratical
2. https://hackertarget.com/xss-tutorial/
3. https://xss-game.appspot.com/
4. http://leettime.net/xsslab1/chalg1.php
6. https://xss-quiz.int21h.jp/
7. https://steve.fi/Security/XSS/Tutorial/
Cross-Site Scripting (XSS) Bug Bounty
- Sleeping stored Google XSS Awakens a $5000 Bounty by Patrik Fehrenbach
- RPO that lead to information leakage in Google by filedescriptor
- God-like XSS, Log-in, Log-out, Log-in in Uber by Jack Whitton
- Three Stored XSS in Facebook by Nirgoldshlager
- Using a Braun Shaver to Bypass XSS Audit and WAF by Frans Rosen
- An XSS on Facebook via PNGs & Wonky Content Types by Jack Whitton
- he is able to make stored XSS from a irrelevant domain to main facebook domain
- Stored XSS in *.ebay.com by Jack Whitton
- Complicated, Best Report of Google XSS by Ramzes
- Tricky Html Injection and Possible XSS in sms-be-vip.twitter.com by secgeek
- Command Injection in Google Console by Venkat S
- Facebook’s Moves — OAuth XSS by PAULOS YIBELO
- Stored XSS in Google Docs (Bug Bounty) by Harry M Gertos
- Stored XSS on developer.uber.com via admin account compromise in Uberby James Kettle (albinowax)
- Yahoo Mail stored XSS by Klikki Oy
- Abusing XSS Filter: One ^ leads to XSS(CVE-2016–3212) by Masato Kinugawa
- Youtube XSS by fransrosen
- Best Google XSS again — by Krzysztof Kotowicz
- IE & Edge URL parsin Problem — by detectify
- Google XSS subdomain Clickjacking
- Microsoft XSS and Twitter XSS
- Google Japan Book XSS
- Flash XSS mega nz — by frans
- Flash XSS in multiple libraries — by Olivier Beg
- xss in google IE, Host Header Reflection
- Years ago Google xss
- xss in google by IE weird behavior
- xss in Yahoo Fantasy Sport
- xss in Yahoo Mail Again, worth $10000 by Klikki Oy
- Sleeping XSS in Google by securityguard
- Decoding a .htpasswd to earn a payload of money by securityguard
- Google Account Takeover
- AirBnb Bug Bounty: Turning Self-XSS into Good-XSS #2 by geekboy
- Uber Self XSS to Global XSS
- How I found a $5,000 Google Maps XSS (by fiddling with Protobuf) by Marin MoulinierFollow
- Airbnb — When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities by Brett
- XSSI, Client Side Brute Force
- postMessage XSS Bypass
- XSS in Uber via Cookie by zhchbin
- Stealing contact form data on www.hackerone.com using Marketo Forms XSS with postMessage frame-jumping and jQuery-JSONP by frans
- XSS due to improper regex in third party js Uber 7k XSS
- XSS in TinyMCE 2.4.0 by Jelmer de Hen
- Pass uncoded URL in IE11 to cause XSS
- Twitter XSS by stopping redirection and javascript scheme by Sergey Bobrov
Brute Force
- Web Authentication Endpoint Credentials Brute-Force Vulnerability by Arne Swinnen
- InstaBrute: Two Ways to Brute-force Instagram Account Credentials by Arne Swinnen
- How I Could Compromise 4% (Locked) Instagram Accounts by Arne Swinnen
- Possibility to brute force invite codes in riders.uber.com by r0t
- Brute-Forcing invite codes in partners.uber.com by Efkan Gökbaş (mefkan)
- How I could have hacked all Facebook accounts by Anand Prakash
- Facebook Account Take Over by using SMS verification code, not accessible by now, may get update from author later by Arun Sureshkumar
Stealing Access Token
- Facebook Access Token Stolen by Jack Whitton –
- Obtaining Login Tokens for an Outlook, Office or Azure Account by Jack Whitton
- Bypassing Digits web authentication’s host validation with HPP by filedescriptor
- Bypass of redirect_uri validation with /../ in GitHub by Egor Homakov
- Bypassing callback_url validation on Digits by filedescriptor
- Stealing livechat token and using it to chat as the user — user information disclosure by Mahmoud G. (zombiehelp54)
- Change any Uber user’s password through /rt/users/passwordless-signup — Account Takeover (critical) by mongo (mongo)
- Internet Explorer has a URL problem, on GitHub by filedescriptor.
- How I made LastPass give me all your passwords by labsdetectify
- Steal Google Oauth in Microsoft
- Steal FB Access Token
- Paypal Access Token Leaked
- Steal FB Access Token
- Appengine Cool Bug
- Slack post message real life experience
- Bypass redirect_uri by nbsriharsha
- Stealing Facebook Messenger nonce worth 15k
Google oauth bypass
CSRF
- Messenger.com CSRF that show you the steps when you check for CSRF by Jack Whitton
- Paypal bug bounty: Updating the Paypal.me profile picture without consent (CSRF attack) by Florian Courtial
- Hacking PayPal Accounts with one click (Patched) by Yasser Ali
- Add tweet to collection CSRF by vijay kumar
- Facebookmarketingdevelopers.com: Proxies, CSRF Quandry and API Funby phwd
- How i Hacked your Beats account ? Apple Bug Bounty by @aaditya_purani
Remote Code Execution
- JDWP Remote Code Execution in PayPal by Milan A Solanki
- XXE in OpenID: one bug to rule them all, or how I found a Remote Code Execution flaw affecting Facebook’s servers by Reginaldo Silva
- How I Hacked Facebook, and Found Someone’s Backdoor Script by Orange Tsai
- How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE! by Orange Tsai
- uber.com may RCE by Flask Jinja2 Template Injection by Orange Tsai
- Yahoo Bug Bounty — *.login.yahoo.com Remote Code Execution by Orange Tsai (Sorry its in Chinese Only)
- How we broke PHP, hacked Pornhub and earned $20,000 by Ruslan Habalov
- Alert, God-like Write-up, make sure you know what is ROP before clicking, which I don’t =(
- RCE deal to tricky file upload by secgeek
- WordPress SOME bug in plupload.flash.swf leading to RCE in Automaticby Cure53 (cure53)
- Read-Only user can execute arbitraty shell commands on AirOS by 93c08539 (93c08539)
- Remote Code Execution by impage upload! by Raz0r (ru_raz0r)
- Popping a shell on the Oculus developer portal by Bitquark
- Crazy! PornHub RCE AGAIN!!! How I hacked Pornhub for fun and profit — 10,000$ by 5haked
- PayPal Node.js code injection (RCE) by Michael Stepankin
- eBay PHP Parameter Injection lead to RCE
- Yahoo Acqusition RCE
- Command Injection Vulnerability in Hostinger by @alberto__segura
- RCE in Airbnb by Ruby Injection by buerRCE
- RCE in Imgur by Command Line
- RCE in git.imgur.com by abusing out dated software by Orange Tsai
- RCE in Disclosure
- Remote Code Execution by struct2 Yahoo Server
- Command Injection in Yahoo Acquisition
- Paypal RCE
- $50k RCE in JetBrains IDE
- $20k RCE in Jenkin Instance by @nahamsec
Deserialization
- Java Deserialization in manager.paypal.com by Michael Stepankin
- Instagram’s Million Dollar Bug by Wesley Wineberg
- (Ruby Cookie Deserialization RCE on facebooksearch.algolia.com by Michiel Prins (michiel)
- Java deserialization by meals
Image Tragick
- Exploiting ImageMagick to get RCE on Polyvore (Yahoo Acquisition) by NaHamSec
- Exploting ImageMagick to get RCE on HackerOne by c666a323be94d57
- Trello bug bounty: Access server’s files using ImageTragick by Florian Courtial
- 40k fb rce
- Yahoo Bleed 1
- Yahoo Bleed 2
Insecure Direct Object Reference (IDOR)
- Trello bug bounty: The websocket receives data when a public company creates a team visible board by Florian Courtial
- Trello bug bounty: Payments informations are sent to the webhook when a team changes its visibility by Florian Courtial
- Change any user’s password in Uber by mongo
- Vulnerability in Youtube allowed moving comments from any video to another by secgeek
- It’s Google Vulnerability, so it’s worth reading, as generally it is more difficult to find Google vulnerability
- Twitter Vulnerability Could Credit Cards from Any Twitter Account by secgeek
- One Vulnerability allowed deleting comments of any user in all Yahoo sitesby secgeek
- Microsoft-careers.com Remote Password Reset by Yaaser Ali
- How I could change your eBay password by Yaaser Ali
- Duo Security Researchers Uncover Bypass of PayPal’s Two-Factor Authentication by Duo Labs
- Hacking Facebook.com/thanks Posting on behalf of your friends! by Anand Prakash
- How I got access to millions of [redacted] accounts
- All Vimeo Private videos disclosure via Authorization Bypass with Excellent Technical Description by Enguerran Gillier (opnsec)
- Urgent: attacker can access every data source on Bime by Jobert Abma (jobert)
- Downloading password protected / restricted videos on Vimeo by Gazza (gazza)
- Get organization info base on uuid in Uber by Severus (severus)
- How I Exposed your Primary Facebook Email Address (Bug worth $4500)by Roy Castillo
- DOB disclosed using “Facebook Graph API Reverse Engineering” by Raja Sekar Durairaj
- Change the description of a video without publish_actions permission in Facebook by phwd
- Response To Request Injection (RTRI) by ?, be honest, thanks to this article, I have found quite a few bugs because of using his method, respect to the author!
- Leak of all project names and all user names , even across applications on Harvest by Edgar Boda-Majer (eboda)
- Changing paymentProfileUuid when booking a trip allows free rides at Uber by Matthew Temmy (temmyscript)
- View private tweet
- Uber Enum UUID
- Hacking Facebook’s Legacy API, Part 1: Making Calls on Behalf of Any Userby Stephen Sclafani
- Hacking Facebook’s Legacy API, Part 2: Stealing User Sessions by Stephen Sclafani
- Delete FB Video
- Delete FB Video
- Facebook Page Takeover by Manipulating the Parameter by arunsureshkumar
- Viewing private Airbnb Messages
- IDOR tweet as any user by kedrisec
- Classic IDOR endpoints in Twitter
- Mass Assignment, Response to Request Injection, Admin Escalation by sean
XXE (XML External Entity)
- How we got read access on Google’s production servers by detectify
- Blind OOB XXE At UBER 26+ Domains Hacked by Raghav Bisht
- XXE through SAML
- XXE in Uber to read local files
- XXE by SVG in community.lithium.com
Unrestricted File Upload
- File Upload XSS in image uploading of App in mopub by vijay kumar
- RCE deal to tricky file upload by secgeek
- File Upload XSS in image uploading of App in mopub in Twitter by vijay kumar (vijay_kumar1110)
Server Side Request Forgery (SSRF)
- ESEA Server-Side Request Forgery and Querying AWS Meta Data by Brett Buerhaus
- SSRF to pivot internal network
- SSRF to LFI
- SSRF to query google internal server
- SSRF by using third party Open redirect by Brett BUERHAUS
- SSRF tips from BugBountyHQ of Images
- SSRF to RCE
- XXE at Twitter
- Blog post: Cracking the Lens: Targeting HTTP’s Hidden Attack-Surface
Race Condition
- Race conditions on Facebook, DigitalOcean and others (fixed) by Josip Franjković
- Race Conditions in Popular reports feature in HackerOne by Fábio Pires (shmoo)
Business Logic Flaw
- Facebook simple technical hack to see the timeline by Ashish Padelkar
- How I Could Steal Money from Instagram, Google and Microsoft by Arne Swinnen
- How I could have removed all your Facebook notes
- Facebook — bypass ads account’s roles vulnerability 2015 by POUYA DARABI
- Uber Ride for Free by anand praka
- Uber Eat for Free by
Authentication Bypass
- OneLogin authentication bypass on WordPress sites via XMLRPC in Uberby Jouko Pynnönen (jouko)
- 2FA PayPal Bypass by henryhoggard
- SAML Bug in Github worth 15000
- Authentication bypass on Airbnb via OAuth tokens theft
- Uber Login CSRF + Open Redirect -> Account Takeover at Uber
- [http://c0rni3sm.blogspot.hk/2017/08/accidentally-typo-to-bypass.html?m=1](Administrative Panel Access) by c0rni3sm
- Uber Bug Bounty: Gaining Access To An Internal Chat System by mishre
HTTP Header Injection
- Twitter Overflow Trilogy in Twitter by filedescriptor
- Twitter CRLF by filedescriptor
- Adblock Plus and (a little) more in Google
- $10k host header by Ezequiel Pereira
Subdomain Takeover
- Hijacking tons of Instapage expired users Domains & Subdomains by geekboy
- Reading Emails in Uber Subdomains
- Slack Bug Journey — by David Vieira-Kurz
- Subdomain takeover and chain it to perform authentication bypass by Arne Swinnen
Author Write Up
- Payment Flaw in Yahoo
- Bypassing Google Email Domain Check to Deliver Spam Email on Google’s Behalf
- When Server Side Request Forgery combine with Cross Site Scripting
XSSI
- Plain Text Reading by XSSI
- JSON hijacking
- OWASP XSSI
- Japan Identifier based XSSI attacks
- JSON Hijack Slide
Email Related
- This domain is my domain — G Suite A record vulnerability
- I got emails — G Suite Vulnerability
- How I snooped into your private Slack messages [Slack Bug bounty worth $2,500]
- Reading Uber’s Internal Emails [Uber Bug Bounty report worth $10,000]
- Slack Yammer Takeover by using TicketTrick by Inti De Ceukelaire
- How I could have mass uploaded from every Flickr account!
Money Stealing
Local File Inclusion
- Disclosure Local File Inclusion by Symlink
- Facebook Symlink Local File Inclusion
- Gitlab Symlink Local File Inclusion
- Gitlab Symlink Local File Inclusion Part II
- Multiple Company LFI
- LFI by video conversion, excited about this trick!
CSV Injection :
1. https://hackerone.com/reports/386116
2. https://hackerone.com/reports/72785
3. https://hackerone.com/reports/223344
4. https://hackerone.com/reports/244292
5. https://payatu.com/csv-injection-basic-to-exploit/
6. https://www.owasp.org/index.php/CSV_Injection
7. https://www.we45.com/blog/2017/02/14/csv-injection-theres-devil-in-the-detail
CRLF: (Carriage Return line feed)
1. https://www.netsparker.com/blog/web-security/crlf-http-header/
2. https://hackerone.com/reports/217058
3. https://hackerone.com/reports/66391
4. https://hackerone.com/reports/237357
5. https://www.acunetix.com/websitesecurity/crlf-injection/
6. https://www.owasp.org/index.php/CRLF_Injection
Host header injection :
1. https://www.linkedin.com/pulse/host-header-injection-depth-utkarsh-tiwari
2. https://hackerone.com/reports/94637
3. https://medium.com/@rockerramg94/host-header-injection-attack-6cf4ffeb5a03
4. https://dzone.com/articles/what-is-a-host-header-attack
5. https://www.acunetix.com/vulnerabilities/web/host-header-attack/
6. https://hackerone.com/reports/235281
Cache poisoning
1. https://blog.stackpath.com/glossary/cache-poisoning/
2. https://portswigger.net/blog/practical-web-cache-poisoning
3. https://hackerone.com/reports/487
4. https://www.hackerone.com/zerodaily/2018-08-10
HTTP Response Splitting
1. https://www.owasp.org/index.php/HTTP_Response_Splitting
2.http://projects.webappsec.org/w/page/13246931/HTTP%20Response%20Splitting
3. https://hackerone.com/reports/171473
4. https://hackerone.com/reports/52042
5. https://hackerone.com/reports/53843
Web parameter tampering :
1. https://www.owasp.org/index.php/Web_Parameter_Tampering
2. https://hackerone.com/reports/141090
3. https://hackerone.com/reports/218748
Express Lang injection:
1. https://portswigger.net/kb/issues/00100f20_expression-language-injection
2. http://danamodio.com/appsec/research/spring-remote-code-with-expression-language-injection/
3. https://www.owasp.org/index.php/Expression_Language_Injection
4. https://www.scribd.com/document/212883640/Expression-Language-Injection
HTML Injection
1. https://www.acunetix.com/vulnerabilities/web/html-injection/
2. https://www.owasp.org/index.php/Testing_for_HTML_Injection_(OTG-CLIENT-003)
3. https://admin.utep.edu/Default.aspx?tabid=54090
4. https://hackerone.com/reports/328210
5. https://hackerone.com/reports/324548
6. https://hackerone.com/reports/383117
Blind XPATH Injection:-
1. https://www.owasp.org/index.php/Blind_XPath_Injection
2. https://www.scip.ch/en/?labs.20180802
3. https://www.paladion.net/blogs/xpath-injection-in-xml-databases
4. http://www.hackeone.info/2017/11/xpath-injection-tutorial-to-hack.html
LDAP Injection:-
1. http://projects.webappsec.org/w/page/13246947/LDAP%20Injection
2. https://www.owasp.org/index.php/LDAP_injection
3. https://portswigger.net/kb/issues/00100500_ldap-injection
4. https://www.synopsys.com/software-integrity/resources/knowledge-database/ldap-injection.html
OS Command Injection
1. https://www.owasp.org/index.php/Command_Injection
2.https://www.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)
3. https://www.checkmarx.com/knowledge/knowledgebase/OS-Command_Injection
4. https://www.hackingarticles.in/beginner-guide-os-command-injection/
5. https://hackerone.com/reports/303061
6. https://hackerone.com/reports/331032
7. https://hackerone.com/reports/340208
8. https://hackerone.com/reports/390865
9. https://hackerone.com/reports/388936
10. https://medium.com/bugbountywriteup/command-injection-poc-72cc3743f10d
SOP Bypass
1. https://resources.infosecinstitute.com/bypassing-same-origin-policy-sop/#gref
2. https://www.hackinglab.com/misc/downloads/event_2010/simon_egli_same_origin_policy_v1.0.pdf
3. https://hackerone.com/reports/164916
4. https://hackerone.com/reports/399427
5. https://hackerone.com/reports/235200
UI redressing attack & Clickjacking :
1. https://www.owasp.org/index.php/Clickjacking
2. https://www.imperva.com/Resources/Glossary/clickjacking-ui-redressing
3. https://www.geeksforgeeks.org/clickjacking-ui-redressing/
4. https://www.thesecuritybuddy.com/vulnerabilities/what-is-clickjacking-or-ui-redress-attack/
5. https://nakedsecurity.sophos.com/2008/10/09/ui-redress-attacks-aka-clickjacking/
6. https://hackerone.com/reports/85624
7. https://hackerone.com/reports/299009
8. https://medium.com/@raushanraj_65039/google-clickjacking-6a04132b918a
9. http://jasminderpalsingh.info/single.php?p=87
10. http://blog.securelayer7.net/clickjacking-vulnerability-google-cloud-print/
Session Fixation :
1. https://www.owasp.org/index.php/Session_fixation
2. https://www.owasp.org/index.php/Testing_for_Session_Fixation_(OTG-SESS-003)
3. http://projects.webappsec.org/w/page/13246960/Session%20Fixation
4. https://medium.com/white-hats/introduction-to-session-fixing-75409ffeaa5
6. https://hackerone.com/reports/135797
7. https://hackerone.com/reports/18501
8. https://hackerone.com/reports/167698
Missing http only
1. https://www.owasp.org/index.php/HttpOnly
2. https://hackerone.com/reports/239380
3. https://hackerone.com/reports/75357
4. https://resources.infosecinstitute.com/securing-cookies-httponly-secure-flags/#gref
Error Message Reveals sensitive Information/ Visible Detailed Error/Debug Page
1. https://hackerone.com/reports/304708
2. https://hackerone.com/reports/294464
3. https://hackerone.com/reports/20279
Token Leakage via Referrer
1. https://hackerone.com/reports/272379
2. https://hackerone.com/reports/342693
3. https://hackerone.com/reports/252544
4. https://hackerone.com/reports/265740
5. https://hackerone.com/reports/253448
User Enumeration:
2. https://blog.rapid7.com/2017/06/15/about-user-enumeration/
3. https://www.hacksplaining.com/prevention/user-enumeration
4. https://portswigger.net/blog/preventing-username-enumeration
5. https://hackerone.com/reports/282564
6. https://hackerone.com/reports/280509
7. https://hackerone.com/reports/250457
8. https://hackerone.com/reports/179701
9. https://hackerone.com/reports/223531
10. https://hackerone.com/reports/257035
11. https://hackerone.com/reports/335427
CSS Injection :
1. https://portswigger.net/kb/issues/00501300_css-injection-reflected
2. https://www.owasp.org/index.php/Testing_for_CSS_Injection_(OTG-CLIENT-005)
3. https://hackerone.com/reports/315865
4. https://hackerone.com/reports/386334
Miscellaneous
- SAML Pen Test Good Paper
- A list of FB writeup collected by phwd by phwd
- NoSQL Injection by websecurify
- CORS in action
- CORS in Fb messenger
- Web App Methodologies
- XXE Cheatsheet
- The road to hell is paved with SAML Assertions, Microsoft Vulnerability
- Study this if you like to learn Mongo SQL Injection by cirw
- Mongo DB Injection again by websecrify
- w3af speech about modern vulnerability by w3af
- Web cache attack that lead to account takeover
- A talk to teach you how to use SAML Raider
- XSS Checklist when you have no idea how to exploit the bug
- CTF write up, Great for Bug Bounty
- It turns out every site uses jquery mobile with Open Redirect is vulnerable to XSS by sirdarckcat
- Bypass CSP by using google-analytics
- Payment Issue with Paypal
- Browser Exploitation in Chinese
- XSS bypass filter
- Markup Impropose Sanitization
- Breaking XSS mitigations via Script Gadget
- X41 Browser Security White Paper
10 rules of Bug Bounty
Following “10 rules of Bug Bounty”
- Targeting the Bug Bounty Program
- How do you Approach the Target ?
- Don’t Expect Anything !
- Less Knowledge about Vulnerabilities and Testing Methodologies
- Surround yourself with Bug Bounty Community to keep yourself Updated
- AUTOMATION
- GET BOUNTY or GET EXPERIENCE
- FIND THE “BUG” or FIND A “BUG’S CHAIN”
- FOLLOW MASTER’S PATH
- RELAX & ENJOY LIFE
Writing Successful Bug & Vulnerability Submission Report
What does a good report look like?
Legend has it that the best bug bounty hunters can write reports in their sleep. OK, jokes aside, while writing reports is a very important part of bug bounty hunting, we can simplify this whole process by following these basic guidelines.
Summary
The first section of your report should start with a brief summary introducing the reader to your finding. Summaries can be as simple as:
example.com is vulnerable to reflected XSS via the q
parameter.
Or as detailed as:
https://imgur.com/vidgif/url endpoint is vulnerable to a SSRF vulnerability which allows an attacker to craft connections originating from imgur servers to any destination on the internet and imgur internal network and craft outgoing UDP-packets / telnet-based protocol sessions (for example, to connect to SMTP servers from imgur and send spam). [1]
Vulnerability Description
This section covers all the details related to your finding. State what you found again, make the technical points clear, and explain what causes the issue. There are exceptions though where this section can be skipped. There is a popular English idiom:
“A picture is worth a thousand words.”
The same can be said about an excellent proof of concept:
“A phenomenal security vulnerability proof of concept is worth a thousand words.”
- Probably Gandhi
Proof of concept
The proof of concept is where you really need to demonstrate the impact in the “flashiest” way possible. Make it as easy as possible for the program to see what the issue is. If your issue is cross-site scripting, then an alert(document.domain)
can go a long way to help the program figure out where the issue lies.
Browsers verified in
Even if the issue is not browser-dependent, it is good practice to inform the program about what browser you used to trigger the vulnerability. This can help the team behind the bug bounty program reproduce your finding.
- Google Chrome: visit
chrome://version/
- Mozilla Firefox: top-right menu icon → ? “Help” → “About Firefox”
- Microsoft Internet Explorer: top-right cog → “About Internet Explorer”
- Microsoft Edge: … → “Settings” → scroll down
Mitigation
If you followed the advice in “How do I get started with bug bounty hunting?”, you should be capable of giving a brief description of how the bug bounty program should fix your finding. It is also a good idea to link to the relevant OWASP Prevention cheat sheet.
Report Writing Well that’s all Folks Hopefully my way of doing basic recon can help you to properly Select the target-Map it out properly-Hunt it down using the information you have gathered and At the end Writing a Report suggestion is to read the blog https://blog.bugcrowd.com/advice-for-writing-a-great-vulnerability-report/
Good Report Example :
1. https://hackerone.com/reports/73567
2. https://bugbountyguide.com/hunters/writing-reports.html
Some great resources for vulnerability report best practices are:
- Dropbox Bug Bounty Program: Best Practices
- Google Bug Hunter University
- A Bounty Hunter’s Guide to Facebook
- Writing a good and detailed vulnerability report
Hope you like it , If you have any queries … Feel free to connect me through linkedin or Twitter :) If I missed something, kindly comment below so i will add to the Bug Bounty- Infosec List- If you like this blog- do clap and share with your friends :)
Whoami:- https://infosecsanyam.wixsite.com/infosecsanyam
Blog :- https://infosecsanyam.blogspot.in/
Linkedin : https://www.linkedin.com/in/infosecsanyam/
“Failure will never overtake me if my determination to succeed is strong enough.“ “ If you don’t give up , you still have a chance” :)
📝 Read this story later in Journal.
🗞 Wake up every Sunday morning to the week’s most noteworthy Tech stories, opinions, and news waiting in your inbox: Get the noteworthy newsletter >