🟢Reversing DexGuard with JEB 3.20:
☑️Part 1 - Code Obfuscation & RASP
https://www.pnfsoftware.com/blog/reversing-dexguard
☑️Part 2 - Assets and Code Encryption
https://www.pnfsoftware.com/blog/reversing-dexguard-encryption/
☑️Part 3 - Code Virtualization
https://www.pnfsoftware.com/blog/reversing-dexguard-virtualization/
🆔@Infosectube
☑️Part 1 - Code Obfuscation & RASP
https://www.pnfsoftware.com/blog/reversing-dexguard
☑️Part 2 - Assets and Code Encryption
https://www.pnfsoftware.com/blog/reversing-dexguard-encryption/
☑️Part 3 - Code Virtualization
https://www.pnfsoftware.com/blog/reversing-dexguard-virtualization/
🆔@Infosectube
☣️Enable DNS over HTTPS #DOH
✔️Open Yogadns
✅Cloudflare "cloudflare-dns.com/dns-query"
✅snopyta "https://fi.doh.dns.snopyta.org/dns-query"
✅Google "https://dns.google/dns-query"
✅Quad9 "https://dns.quad9.net/dns-query"
✅Blahdns "https://doh2.blahdns.com/dns-query"
✅CZ.NIC "https://odvr.nic.cz/doh"
📌 @Infosectube
✔️Open Yogadns
✅Cloudflare "cloudflare-dns.com/dns-query"
✅snopyta "https://fi.doh.dns.snopyta.org/dns-query"
✅Google "https://dns.google/dns-query"
✅Quad9 "https://dns.quad9.net/dns-query"
✅Blahdns "https://doh2.blahdns.com/dns-query"
✅CZ.NIC "https://odvr.nic.cz/doh"
📌 @Infosectube
☢️What is the Tachyon Protocol?
Tachyon Protocol is what nodes and users in the Tachyon network speak to one another. It ensures that traffic moves from place to place privately, securely, and quickly.
Based on Tachyon Protocol, the Next-Gen VPN, IoT, DeFi, Storage, CDN, DNS and other Apps will benefit 900 million users at least.
پروتکل جدید Tachyon
بدون سرور مرکزی
کلیه سرورهایی که استفاده می کنید از سایر کاربران جهانی است که در سراسر جهان توزیع می شوند و توسط افراد مختلف اداره می شوند. از آنجا که هیچ سرور متمرکز برای انتقال اطلاعات وجود ندارد ، امکان ثبت اطلاعات در یک مخزن واحد وجود ندارد ، به این معنی که هیچ کس نمی تواند حریم شخصی شما را جمع کند و هنگام حذف سرورهای مرکزی اطلاعات شخصی شما را بفروشد.
ویژگی ها:
💵رایگان
💎بدون ثبتنام
💣منبع باز
⚙️امن
لینک دانلود ios
ios
لینک گوگل پلی
android
لینک دانلود مک
mac
🆔@InfoSecTube
Tachyon Protocol is what nodes and users in the Tachyon network speak to one another. It ensures that traffic moves from place to place privately, securely, and quickly.
Based on Tachyon Protocol, the Next-Gen VPN, IoT, DeFi, Storage, CDN, DNS and other Apps will benefit 900 million users at least.
پروتکل جدید Tachyon
بدون سرور مرکزی
کلیه سرورهایی که استفاده می کنید از سایر کاربران جهانی است که در سراسر جهان توزیع می شوند و توسط افراد مختلف اداره می شوند. از آنجا که هیچ سرور متمرکز برای انتقال اطلاعات وجود ندارد ، امکان ثبت اطلاعات در یک مخزن واحد وجود ندارد ، به این معنی که هیچ کس نمی تواند حریم شخصی شما را جمع کند و هنگام حذف سرورهای مرکزی اطلاعات شخصی شما را بفروشد.
ویژگی ها:
💵رایگان
💎بدون ثبتنام
💣منبع باز
⚙️امن
لینک دانلود ios
ios
لینک گوگل پلی
android
لینک دانلود مک
mac
🆔@InfoSecTube
tachyon
Tachyon VPN: Top Decentralized VPN With Over One Million Users| Tachyon Protocol (IPX)
The most popular decentralized VPN based on blockchain technology. Tachyon VPN is the first Dapp released by Tachyon Protocol(IPX token) which serves over one million global users.
#Bug_Bounty_Tips_1
🛡BugBounty_Tips
useful one-liner to check a list of hostnames for OpenSSL Heartbleed vulnerability:
🛡BugBounty_Tips
useful one-liner to check a list of hostnames for OpenSSL Heartbleed vulnerability:
cat list.txt | while read line ; do echo "QUIT" | openssl s_client -connect $line:443 2>&1 | grep 'server extension "heartbeat" (id=15)' || echo $line: safe; done☣️@InfoSecTube
#Bug_Bounty_Tips_2
🛡BugBounty_Tips
Here’s a handy command to extract URLs from junk / assorted data:
1-From Files:
🛡BugBounty_Tips
Here’s a handy command to extract URLs from junk / assorted data:
1-From Files:
cat file | grep -Eo "(http|https)://[a-zA-Z0-9./?=_-]*"*2-From Websites:
curl https://target.com/file.js | grep -Eo "(http|https)://[a-zA-Z0-9./?=_-]*"*☣️@InfoSecTube
#Bug_Bounty_Tips_3
🛡BugBounty_Tips
Here’s a tip to extract interesting (potentially sensitive) information from unpacked APK files (Android App):
Make sure to first unpack the APK file using apktool like this:
🛡BugBounty_Tips
Here’s a tip to extract interesting (potentially sensitive) information from unpacked APK files (Android App):
Make sure to first unpack the APK file using apktool like this:
apktool d app_name.apkWith this one-liner we can identify URLs, API keys, authentication tokens, credentials, certificate pinning code and much more.
grep -EHirn "accesskey|admin|aes|api_key|apikey|checkClientTrusted|crypt|http:|https:|password|pinning|secret|SHA256|SharedPreferences|superuser|token|X509TrustManager|insert into" APKfolder/☣️@InfoSecTube
#Bug_Bounty_Tips_4
🛡BugBounty_Tips
Here are the top dorks to find Open Redirect vulnerabilities :
🛡BugBounty_Tips
Here are the top dorks to find Open Redirect vulnerabilities :
/{payload}
?next={payload}
?target={payload}
?rurl={payload}
?dest={payload}
?destination={payload}
?redir={payload}
?redirect_uri={payload}
?redirect_url={payload}
?redirect={payload}
/redirect/{payload}
/cgi-bin/redirect.cgi?{payload}
/out/{payload}
/out?{payload}
☣️@InfoSecTube#Bug_Bounty_Tips_5
🛡BugBounty_Tips
Here are 3 tips to bypass JWT token authentication.
Tip #1:
💎Capture the JWT.
💎Change the algorithm to None.
💎Change the content of the claims in the body with whatever you want e.g.: email: [email protected]
💎Send the request with the modified token and check the result.
Tip #2:
✅Capture the JWT token.
✅If the algorithm is RS256 change to HS256 and sign the token with the public key (which you can get by visiting jwks Uri / mostly it will be the public key from the site’s https certificate)
✅Send the request with the modified token and check the response.
✅You can party with the bounty if the backend doesn’t have the algorithm check.
Tip #3: Check for proper server-side session termination
🔰Check if the application is using JWT tokens for authentication.
🔰If so, login to the application and capture the token. (Mostly web apps stores the token in the local storage of the browser)
🔰Now logout of the application.
🔰Now make a request to the privileged endpoint with the token captured earlier.
🔰Sometimes, the request will be successful as the web apps just delete the token from browser and won’t blacklist the tokens in the backend.
☣️@InfoSecTube
🛡BugBounty_Tips
Here are 3 tips to bypass JWT token authentication.
Tip #1:
💎Capture the JWT.
💎Change the algorithm to None.
💎Change the content of the claims in the body with whatever you want e.g.: email: [email protected]
💎Send the request with the modified token and check the result.
Tip #2:
✅Capture the JWT token.
✅If the algorithm is RS256 change to HS256 and sign the token with the public key (which you can get by visiting jwks Uri / mostly it will be the public key from the site’s https certificate)
✅Send the request with the modified token and check the response.
✅You can party with the bounty if the backend doesn’t have the algorithm check.
Tip #3: Check for proper server-side session termination
🔰Check if the application is using JWT tokens for authentication.
🔰If so, login to the application and capture the token. (Mostly web apps stores the token in the local storage of the browser)
🔰Now logout of the application.
🔰Now make a request to the privileged endpoint with the token captured earlier.
🔰Sometimes, the request will be successful as the web apps just delete the token from browser and won’t blacklist the tokens in the backend.
☣️@InfoSecTube
#Bug_Bounty_Tips_6
🛡BugBounty_Tips
Before Run this script we have to install couple of additional tools:
amass
assetfinder
subfinder
filter-resolved
Here’s a quick and basic recon routine for finding subdomains while doing bug bounty:
🛡BugBounty_Tips
Before Run this script we have to install couple of additional tools:
amass
assetfinder
subfinder
filter-resolved
Here’s a quick and basic recon routine for finding subdomains while doing bug bounty:
#!/bin/bash☣️@InfoSecTube
# $1 => example.domain
amass enum --passive -d $1 -o domains_$1
assetfinder --subs-only $1 | tee -a domains_41
subfinder -d $1 -o domains_subfinder_$1
cat domains_subfinder_$1 | tee -a domains_$1
sort -u domains_$1 -o domains_$1
cat domains_$1 | filter-resolved | tee -a domains_$1.txt
GitHub
GitHub - owasp-amass/amass: In-depth attack surface mapping and asset discovery
In-depth attack surface mapping and asset discovery - owasp-amass/amass
👍1
#Bug_Bounty_Tips_7
🛡BugBounty_Tips
Install Instruction:
apt-get -y install parallel
Here’s a super useful recon one-liner to quickly validate list of hostnames and subdomains:
🛡BugBounty_Tips
Install Instruction:
apt-get -y install parallel
Here’s a super useful recon one-liner to quickly validate list of hostnames and subdomains:
cat alive-subdomains.txt | parallel -j50 -q curl -w 'Status:%{http_code}\t Size:%{size_download}\t %{url_effective}\n' -o /dev/null -sk
This one-liner will spawn 50 instances of curl in parallel and display the HTTP status code and response size in bytes for each host in a beautiful way😊☣️@InfoSecTube
#Bug_Bounty_Tips_8
🛡BugBounty_Tips
Before Run this script you must install several additional tools:
subfinder
amass
httpprob
waybackurls
kxss
this shell script to identify XSS (Cross-Site Scripting) vulnerabilities using a number of open-source tools chained together:
🛡BugBounty_Tips
Before Run this script you must install several additional tools:
subfinder
amass
httpprob
waybackurls
kxss
this shell script to identify XSS (Cross-Site Scripting) vulnerabilities using a number of open-source tools chained together:
#!/bin/bash☣️@InfoSecTube
# $1 => example.domain
subfinder -d $1 -o domains_subfinder_$1
amass enum --passive -d $1 -o domains_$1
cat domains_subfinder_$1 | tee -a domain_$1
cat domains_$1 | filter-resolved | tee -a domains_$1.txt
cat domains_$1.txt | ~/go/bin/httprobe -p http:81 -p http:8080 -p https:8443 | waybackurls | kxss | tee xss.txt
🔥1
#Bug_Bounty_Tips_9
🛡BugBounty_Tips
Sometimes, developers think that hiding a button is enough. Try accessing the following sign-up URIs.
Chances are that we will be able to register a new user and access privileged areas of the web application, or at least get a foothold into it.
☣️@InfoSecTube
🛡BugBounty_Tips
Sometimes, developers think that hiding a button is enough. Try accessing the following sign-up URIs.
Chances are that we will be able to register a new user and access privileged areas of the web application, or at least get a foothold into it.
☣️@InfoSecTube
#Bug_Bounty_Tips_10
🛡BugBounty_Tips
Here are Top 5 Google dorks for identifying interesting and potentially sensitive information about our target:
With these dorks we are looking for open directory listing, log files, private keys, spreadsheets, database files and other interesting data.
☣️@InfoSecTube
🛡BugBounty_Tips
Here are Top 5 Google dorks for identifying interesting and potentially sensitive information about our target:
inurl:example.com intitle:"index of"
inurl:example.com intitle:"index of /" "*key.pem"
inurl:example.com ext:log
inurl:example.com intitle:"index of" ext:sql|xls|xml|json|csv
inurl:example.com "MYSQL_ROOT_PASSWORD:" ext:env OR ext:yml -git
With these dorks we are looking for open directory listing, log files, private keys, spreadsheets, database files and other interesting data.
☣️@InfoSecTube