InfoSecTube
1.71K subscribers
682 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
#Bug_Bounty_Tips_16
🛡BugBounty_Tips
🌀Registering as an Employee leads to claim of Employee Only Private Offers and ultimately getting an “Identification Card”.

Methodolgy:
1-Searched for Target‘s employee offers on Google:
inurl:"Target Name" employee offers
2-Found website which provides offers to the Target.
3-Found that offers were restricted to employees only.
4-Tried registering with random numbers in the “Employee ID” field
5-Successfully registered as an employee because of no verification of the “Employee ID“.
6-Registering as an employee leads to claim of private offers.
7-The website also provides an “Identification Card” which can be used to show that we are a legitimate employee of the Target.
☣️@InfoSecTube
This media is not supported in your browser
VIEW IN TELEGRAM
#Bug_Bounty_Tips_17
🛡BugBounty_Tips
Here’s an example of exposed RocketMQ

RocketMQ
is a distributed messaging and streaming platform with low latency, high performance and reliability, trillion-level capacity and flexible scalability.

this time to pull up RocketMQ console which often has quite confidential production information disclosed(Shodan Dorks):
org:target.com http.title:rocketmq-console
From the exposed RocketMQ consoles we can for example find out:
1-Additional hostnames and subdomains
2-Internal IP addresses
3-Log file locations
4-Version details
5-etc
Session Hijacking MindMap
☣️@InfoSecTube
⁉️What happens when you type a URL in the browser and press enter?

🔰@InfoSecTube
#Bug_Bounty_Tips_18
🛡BugBounty_Tips
🌀Want to find critical bugs by changing a single header?set the ‘Host’ header to ‘localhost’ in your next directory bruteforce, the results might be surprising! You might gain access to:
1️⃣Special features
2️⃣Internal endpoints
3️⃣Config files, SSL keys
4️⃣Directory listing, …

We
can even take this a step further and try to identify all sites that are hosted on the target web server by performing virtual host enumeration. How to enumerate virtual hosts? We could use tools such as these:
ffuf
https-vhosts
virtual-host-discovery

Note that we could also use curl or wget:
curl -v -H "Host: localhost" https://target/
wget -d --header="Host: localhost" https://target/

☣️@InfoSecTube
👍1
#Bug_Bounty_Tips_19
🛡BugBounty_Tips
🌀Javascript polyglot for XSS
Note that we may only need a certain portion of the polyglot, depending on our situation. Do not copy & paste blindly.

☣️
@InfoSecTube
#Bug_Bounty_Tips_20
🛡BugBounty_Tips
🌀Did you know that we can find related domains and sub domains to our target by looking for the same favicon icon hash?
Simply said, favihash will allow us to discover domains that have the same favicon icon hash as our target. Grab the tool from here:
☢️favihash
☣️@InfoSecTube
#Bug_Bounty_Tips_21
🛡BugBounty_Tips
🌀 Account takeover by JWT token forging

Methodolgy
:
Decompiled APK and found API endpoint
>> /signup/users/generateJwtToken
Sent to repeater (Burp Suite)
Added Auth-Token header in the request
Used my account’s auth token in the header
Removed the signature part –> It works !!
Changed user id in token using JOSEPH in Burp Suite
Got other user’s JWT token in the response
Account takeover!

Note that all other endpoints were properly checking the JWK token.



🔰JOSEPH

☣️@InfoSecTube
📊 در جدول فوق مشاهده می کنیم که هکرها یا نفوذگران برای بدست آوردن یا شکستنرمز عبور شما چه میزان زمان نیاز دارد.
🛎@Infosectube