๐ฎ NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data for given IP addresses using various online services.
๐https://github.com/nullenc0de/netscan
๐https://github.com/nullenc0de/netscan
๐ฅ6โค1
Top 50 Google Dorks for #BugBounty and #Responsible #Disclosure Programs For Beginners
inurl:"/bug bounty"
inurl:"/responsible disclosure"
inurl:"/security.txt"
inurl:"/responsible-disclosure/reward"
inurl:"/responsible-disclosure/swag"
"submit vulnerability report" | "powered by bugcrowd" | "powered by hackerone"
site:.gov. "responsible disclosure"
intext:"we take security very seriously"
.com"powered by bugcrowd" -site
report vulnerabilitysite:*.edu intext
" -hackerone -bugcrowd -synack -openbugbountyinurl:"/.well-known/security ext
inurl:"security report reward"
intext:"responsible disclosure" university
" "contact"inurl:"/security ext
inurl:"vulnerability-disclosure-policy" reward
intext:"report security vulnerability"
inurl:"/security-report"
inurl:"/vulnerability-report"
inurl:"/responsible-disclosure" ext
inurl:"/bug-bounty-program"
inurl:"/bounty-program"
inurl:"/security-researchers"
.cominurl:"/security-ext" -site
"inurl:"/vulnerability ext
inurl:"/security-response"
site:*.org "responsible disclosure"
site:*.gov "submit vulnerability"
intext:"vulnerability submission program"
"inurl:"/bounty ext
"inurl:"/bug-bounty ext
inurl:"security-reporting"
inurl:"security policy reward"
inurl:"responsible disclosure" reward
"inurl:"/responsible-disclosure ext
"inurl:"/responsible-disclosure ext
"inurl:"/bug-bounty ext
"inurl:"/vulnerability-report ext
inurl:"security report bug reward"
inurl:"vulnerability-reward-program"
inurl:"/bounty-policy"
inurl:"/bug-report"
inurl:"security vulnerability report reward"
site:*.edu "bug bounty"
"inurl:"/vuln ext
"inurl:"/security ext
inurl:"security vulnerability report"
"inurl:"/bug-bounty ext
"inurl:"/responsible-disclosure ext
inurl:"bug bounty" filetype
site:*.gov intext:"submit a vulnerability"
inurl:"/bug bounty"
inurl:"/responsible disclosure"
inurl:"/security.txt"
inurl:"/responsible-disclosure/reward"
inurl:"/responsible-disclosure/swag"
"submit vulnerability report" | "powered by bugcrowd" | "powered by hackerone"
site:.gov. "responsible disclosure"
intext:"we take security very seriously"
.com"powered by bugcrowd" -site
report vulnerabilitysite:*.edu intext
" -hackerone -bugcrowd -synack -openbugbountyinurl:"/.well-known/security ext
inurl:"security report reward"
intext:"responsible disclosure" university
" "contact"inurl:"/security ext
inurl:"vulnerability-disclosure-policy" reward
intext:"report security vulnerability"
inurl:"/security-report"
inurl:"/vulnerability-report"
inurl:"/responsible-disclosure" ext
inurl:"/bug-bounty-program"
inurl:"/bounty-program"
inurl:"/security-researchers"
.cominurl:"/security-ext" -site
"inurl:"/vulnerability ext
inurl:"/security-response"
site:*.org "responsible disclosure"
site:*.gov "submit vulnerability"
intext:"vulnerability submission program"
"inurl:"/bounty ext
"inurl:"/bug-bounty ext
inurl:"security-reporting"
inurl:"security policy reward"
inurl:"responsible disclosure" reward
"inurl:"/responsible-disclosure ext
"inurl:"/responsible-disclosure ext
"inurl:"/bug-bounty ext
"inurl:"/vulnerability-report ext
inurl:"security report bug reward"
inurl:"vulnerability-reward-program"
inurl:"/bounty-policy"
inurl:"/bug-report"
inurl:"security vulnerability report reward"
site:*.edu "bug bounty"
"inurl:"/vuln ext
"inurl:"/security ext
inurl:"security vulnerability report"
"inurl:"/bug-bounty ext
"inurl:"/responsible-disclosure ext
inurl:"bug bounty" filetype
site:*.gov intext:"submit a vulnerability"
๐4๐ฅ4โค3
Please open Telegram to view this post
VIEW IN TELEGRAM
โค4
Don't miss this opportunity to boost your cybersecurity career!
Please open Telegram to view this post
VIEW IN TELEGRAM
If you're new to bug bounty, you should not learn recon.
๐12โค2
Recently found a SAML vulnerability, any website that allows users to configure SAML also takes a x509 certificate as input there will be an implicit trust between IDP and SP. (You can easily perform an account takeover via using your own x509 cert, Signed saml response with the victim's email)
๐ฅ5
Also SAML can be used for session hijacking/login csrf
- User is entering his credit card details while attacker's site is open
- Attacker swaps the session using SAML session hijacking and now card details will be saved in attacker's account
- User is entering his credit card details while attacker's site is open
- Attacker swaps the session using SAML session hijacking and now card details will be saved in attacker's account
๐ฅ4โค1
Brut Security pinned ยซ๐ฅ Join Our Bugbounty Discussion Group ๐ฅ ๐ฅ https://t.iss.one/brutsec๐ฅ ๐ค https://discord.gg/GZBsQMY6๐ค ยป
Please open Telegram to view this post
VIEW IN TELEGRAM
Telegram
Discussion
Community Discussion
โค2๐2
โก FFUF Web Parser is a web-based tool built using React and Node.js that allows users to upload FFUF JSON files, apply a variety of filters, and export the filtered results to an Excel file. The tool supports filtering based on status codes, response data, lines, length, and URLs (including regex filtering). It also provides the ability to view, manipulate, and extract valuable information from FFUF fuzzing results.
๐https://github.com/VikzSharma/ffufwebparser
๐https://github.com/VikzSharma/ffufwebparser
๐6โค2
CVE-2024-37288, -37285: RCE in Kibana, 9.9 rating ๐ฅ๐ฅ๐ฅ
By improperly deserializing YAML, attackers can perform RCE. The attack is quite complex, but Elastic still recommends updating.
Search at Netlas.io:
๐ Link: https://nt.ls/cVF9O
๐ Dork: http.favicon.hash_sha256:30db4185530d8617e9f08858787a24b219ac5102321b48515baf5da7ac43b590
Read more: https://securityonline.info/critical-kibana-flaws-cve-2024-37288-cve-2024-37285-expose-systems-to-arbitrary-code-execution/
By improperly deserializing YAML, attackers can perform RCE. The attack is quite complex, but Elastic still recommends updating.
Search at Netlas.io:
๐ Link: https://nt.ls/cVF9O
๐ Dork: http.favicon.hash_sha256:30db4185530d8617e9f08858787a24b219ac5102321b48515baf5da7ac43b590
Read more: https://securityonline.info/critical-kibana-flaws-cve-2024-37288-cve-2024-37285-expose-systems-to-arbitrary-code-execution/
๐3โค1
CVE-2024-29847 and other: Multiple vulns in Ivanti EPM, 4.3 - 10.0 rating ๐ฅ๐ฅ๐ฅ
Numerous vulnerabilities in Ivanti. Includes, but is not limited to, RCE with the highest severity score!
Search at Netlas.io:
๐ Link: https://nt.ls/pHqay
๐ Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")
Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022?language=en_US
Numerous vulnerabilities in Ivanti. Includes, but is not limited to, RCE with the highest severity score!
Search at Netlas.io:
๐ Link: https://nt.ls/pHqay
๐ Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")
Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022?language=en_US
๐2โค1
Add to your wordlist:
auth/jwt/register
auth-demo/register/classic
auth-demo/register/modern
auth/jwt/register
auth-demo/register/classic
auth-demo/register/modern
๐ฅ3โค1