InfoSecTube
1.71K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
🟢Reversing DexGuard with JEB 3.20:

☑️Part 1 - Code Obfuscation & RASP
https://www.pnfsoftware.com/blog/reversing-dexguard

☑️Part 2 - Assets and Code Encryption
https://www.pnfsoftware.com/blog/reversing-dexguard-encryption/

☑️Part 3 - Code Virtualization
https://www.pnfsoftware.com/blog/reversing-dexguard-virtualization/

🆔@Infosectube
☢️What is the Tachyon Protocol?
Tachyon Protocol is what nodes and users in the Tachyon network speak to one another. It ensures that traffic moves from place to place privately, securely, and quickly.

Based on Tachyon Protocol, the Next-Gen VPN, IoT, DeFi, Storage, CDN, DNS and other Apps will benefit 900 million users at least.

پروتکل جدید Tachyon
بدون سرور مرکزی
کلیه سرورهایی که استفاده می کنید از سایر کاربران جهانی است که در سراسر جهان توزیع می شوند و توسط افراد مختلف اداره می شوند. از آنجا که هیچ سرور متمرکز برای انتقال اطلاعات وجود ندارد ، امکان ثبت اطلاعات در یک مخزن واحد وجود ندارد ، به این معنی که هیچ کس نمی تواند حریم شخصی شما را جمع کند و هنگام حذف سرورهای مرکزی اطلاعات شخصی شما را بفروشد.
ویژگی ها:
💵رایگان
💎بدون ثبتنام
💣منبع باز
⚙️امن
لینک دانلود ios
ios
لینک گوگل پلی
android
لینک دانلود مک
mac

🆔@InfoSecTube
📡Recon Map
@InfoSecTube
#Bug_Bounty_Tips_1
🛡BugBounty_Tips
useful one-liner to check a list of hostnames for OpenSSL Heartbleed vulnerability:
cat list.txt | while read line ; do echo "QUIT" | openssl s_client -connect $line:443 2>&1 | grep 'server extension "heartbeat" (id=15)' || echo $line: safe; done

☣️@InfoSecTube
#Bug_Bounty_Tips_2
🛡BugBounty_Tips
Here’s a handy command to extract URLs from junk / assorted data:
1-From Files:
cat file | grep -Eo "(http|https)://[a-zA-Z0-9./?=_-]*"*
2-From Websites:
curl https://target.com/file.js | grep -Eo "(http|https)://[a-zA-Z0-9./?=_-]*"*



☣️@InfoSecTube
#Bug_Bounty_Tips_3
🛡BugBounty_Tips
Here’s a tip to extract interesting (potentially sensitive) information from unpacked APK files (Android App):

Make
sure to first unpack the APK file using apktool like this:
apktool d app_name.apk
With this one-liner we can identify URLs, API keys, authentication tokens, credentials, certificate pinning code and much more.

grep -EHirn "accesskey|admin|aes|api_key|apikey|checkClientTrusted|crypt|http:|https:|password|pinning|secret|SHA256|SharedPreferences|superuser|token|X509TrustManager|insert into" APKfolder/

☣️@InfoSecTube
Acunetix Web Vulnerability Scanner 12.0.181218140 Retail.rar
74.4 MB
Acunetix Web Vulnerability Scanner 12.0.181218140 Retail

@Infosectube
#Bug_Bounty_Tips_4
🛡BugBounty_Tips
Here
are the top dorks to find Open Redirect vulnerabilities :
/{payload}
?next={payload}
?target={payload}
?rurl={payload}
?dest={payload}
?destination={payload}
?redir={payload}
?redirect_uri={payload}
?redirect_url={payload}
?redirect={payload}
/redirect/{payload}
/cgi-bin/redirect.cgi?{payload}
/out/{payload}
/out?{payload}

☣️@InfoSecTube
#Bug_Bounty_Tips_5
🛡BugBounty_Tips
Here are 3 tips to bypass JWT token authentication.

Tip #1:

💎Capture the JWT.
💎Change the algorithm to None.
💎Change the content of the claims in the body with whatever you want e.g.: email: [email protected]
💎Send the request with the modified token and check the result.

Tip #2:

Capture
the JWT token.
If the algorithm is RS256 change to HS256 and sign the token with the public key (which you can get by visiting jwks Uri / mostly it will be the public key from the site’s https certificate)
Send the request with the modified token and check the response.
You can party with the bounty if the backend doesn’t have the algorithm check.

Tip #3: Check for proper server-side session termination

🔰Check
if the application is using JWT tokens for authentication.
🔰If so, login to the application and capture the token. (Mostly web apps stores the token in the local storage of the browser)
🔰Now logout of the application.
🔰Now make a request to the privileged endpoint with the token captured earlier.
🔰Sometimes, the request will be successful as the web apps just delete the token from browser and won’t blacklist the tokens in the backend.

☣️@InfoSecTube
#Bug_Bounty_Tips_6
🛡BugBounty_Tips

Before
Run this script we have to install couple of additional tools:
amass
assetfinder
subfinder
filter-resolved

Here’s a quick and basic recon routine for finding subdomains while doing bug bounty:
#!/bin/bash
# $1 => example.domain

amass enum --passive -d $1 -o domains_$1
assetfinder --subs-only $1 | tee -a domains_41

subfinder -d $1 -o domains_subfinder_$1
cat domains_subfinder_$1 | tee -a domains_$1

sort -u domains_$1 -o domains_$1
cat domains_$1 | filter-resolved | tee -a domains_$1.txt
☣️@InfoSecTube
👍1
#Bug_Bounty_Tips_7
🛡BugBounty_Tips
Install Instruction:
apt-get -y install parallel
Here
’s a super useful recon one-liner to quickly validate list of hostnames and subdomains:
cat alive-subdomains.txt | parallel -j50 -q curl -w 'Status:%{http_code}\t  Size:%{size_download}\t %{url_effective}\n' -o /dev/null -sk
This one-liner will spawn 50 instances of curl in parallel and display the HTTP status code and response size in bytes for each host in a beautiful way😊
 
☣️@InfoSecTube
#Bug_Bounty_Tips_8
🛡BugBounty_Tips
Before Run this script you must install several additional tools:
subfinder
amass
httpprob
waybackurls
kxss

this shell script to identify XSS (Cross-Site Scripting) vulnerabilities using a number of open-source tools chained together:
#!/bin/bash
# $1 => example.domain

subfinder -d $1 -o domains_subfinder_$1
amass enum --passive -d $1 -o domains_$1

cat domains_subfinder_$1 | tee -a domain_$1
cat domains_$1 | filter-resolved | tee -a domains_$1.txt

cat domains_$1.txt | ~/go/bin/httprobe -p http:81 -p http:8080 -p https:8443 | waybackurls | kxss | tee xss.txt

☣️@InfoSecTube
🔥1
#Bug_Bounty_Tips_9
🛡BugBounty_Tips
Sometimes
, developers think that hiding a button is enough. Try accessing the following sign-up URIs.
Chances are that we will be able to register a new user and access privileged areas of the web application, or at least get a foothold into it.

☣️@InfoSecTube
#Bug_Bounty_Tips_10
🛡BugBounty_Tips
Here
are Top 5 Google dorks for identifying interesting and potentially sensitive information about our target:
inurl:example.com intitle:"index of"
inurl:example.com intitle:"index of /" "*key.pem"
inurl:example.com ext:log
inurl:example.com intitle:"index of" ext:sql|xls|xml|json|csv
inurl:example.com "MYSQL_ROOT_PASSWORD:" ext:env OR ext:yml -git

With these dorks we are looking for open directory listing, log files, private keys, spreadsheets, database files and other interesting data.

☣️@InfoSecTube