Dot Dot Semicolon RCE
https://thehackingfactory.com/dot-dot-semicolon-rce
#Java
#RCE
#BugBounty
@web_priv8
https://thehackingfactory.com/dot-dot-semicolon-rce
#Java
#RCE
#BugBounty
@web_priv8
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Demo https://youtu.be/WLurj5Lg8cI
https://github.com/r3curs1v3-pr0xy/vajra
#Tool
#Recon
#BugBounty
@web_priv8
Demo https://youtu.be/WLurj5Lg8cI
https://github.com/r3curs1v3-pr0xy/vajra
#Tool
#Recon
#BugBounty
@web_priv8
Forwarded from ناویا، ماشین کاوش اپلای
ارائههای امسال آفسکانف هماکنون از یوتیوب قابل دسترس است.
THE ULTIMATE GUIDE TO FINDING AND ESCALATING XSS BUGS
https://www.bugcrowd.com/blog/the-ultimate-guide-to-finding-and-escalating-xss-bugs/
#XSS
@web_priv8
https://www.bugcrowd.com/blog/the-ultimate-guide-to-finding-and-escalating-xss-bugs/
#XSS
@web_priv8
Finding Broken Access Controls
https://threat.tevora.com/finding-broken-access-controls/amp/
#IDOR
#BurpSuite
#BugBountyTip
@web_priv8
https://threat.tevora.com/finding-broken-access-controls/amp/
#IDOR
#BurpSuite
#BugBountyTip
@web_priv8
Threat Blog
Finding Broken Access Controls
This blog post is intended to be a guide on effective and efficient methods of identifying broken access control. This is not an end-all-be-all guide and explanation of broken access controls. What Are Access Controls?Access controls are policies put in place…
IDOR vulnerability automation using Autorize and AutoRepeater
https://www.youtube.com/watch?v=3K1-a7dnA60
#IDOR
#BurpSuite
#BugBountyTip
@web_priv8
https://www.youtube.com/watch?v=3K1-a7dnA60
#IDOR
#BurpSuite
#BugBountyTip
@web_priv8
YouTube
Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)
Have you ever wondered how hackers find and exploit IDOR (Insecure Direct Object Reference)?
In this video STÖK get schooled by Fisher who shows him how to setup and hunt for IDORS using BURP Suite & plugins like Autorize and AutoRepeter.
Fisher:
https:…
In this video STÖK get schooled by Fisher who shows him how to setup and hunt for IDORS using BURP Suite & plugins like Autorize and AutoRepeter.
Fisher:
https:…
توی پنتست شبکه های داخلی یه سازمان ممکنه دسترسی مارو به اینترنت محدود کرده باشن، بعضی مواقع ما میتونیم اطلاعات رو از طریق ارتباط DNS ارسال کنیم، البته برای آسیب پذیری های وب هم مثل Blind Command Injection میتونه کارآمد باشه.
https://www.go350.com/posts/exfiltrate-files-using-the-dns/
#DNS
#Blind
#RedTeam
@web_priv8
https://www.go350.com/posts/exfiltrate-files-using-the-dns/
#DNS
#Blind
#RedTeam
@web_priv8
Go350
Exfiltrate files using the DNS
yes you can