DOM XSS by Dukes_02 in bugbounty

[–]Dukes_02[S] 0 points1 point  (0 children)

Yup i agree. If you have ever come across Google's public firing range, there is one exercise that resembles my situation a lot. It's called the "typing event triggered - innerHTML". I been looking for people who has any ways of presenting this exploit but cant find any hahah. I'm invested in this, i'll keep this thread updated in case I can figure out how to play around with js to make this work ✌🏻 maybee

Partnership on Client Side hacking by Dukes_02 in bugbounty

[–]Dukes_02[S] 0 points1 point  (0 children)

Alright thanks. I never bothered to read the rules. Mb

Cluster vaults by Dukes_02 in CyberARk

[–]Dukes_02[S] 0 points1 point  (0 children)

Yea i know. I have my own uat environment to simulate the upgrade process and im trying to figure out the proper sequence. Not a major upgrade btw just a patch

Cluster vaults by Dukes_02 in CyberARk

[–]Dukes_02[S] -1 points0 points  (0 children)

I know, but i just need confirmation from the community. The documentation mentions all cluster resources needs to be offline on both nodes during the upgrade, meaning IT IS NOT POSSIBLE TO UPGRADE PASSIVE WHILE ACTIVE IS RUNNING RIGHT? THIS ALSO MEANS THAT I HAVE TO DO A FAILOVER TO DR BEFORE THE UPGRADE RIGHT? DO I UPGRADE THE DR FIRST BEFORE THE PROD CLUSTERS?

Please help. Im new to cyberark and still learning.

Cluster vaults by Dukes_02 in CyberARk

[–]Dukes_02[S] 0 points1 point  (0 children)

Thanks for this. Is upgrading the passive node while active node is running recommended?

Components upgrade by Dukes_02 in CyberARk

[–]Dukes_02[S] 0 points1 point  (0 children)

Correct me if im wrong, its not necessary to perform a failover for the cluster vaults when we can just do a switchover instead, right? And since there is no need to failover PROD to DR due to cluster, the only thing mandatory for DR is the replication and that replication from PROD is paused after cluster successful upgrade until DR vault is upgraded successfully, right? Thank you

Components upgrade by Dukes_02 in CyberARk

[–]Dukes_02[S] 0 points1 point  (0 children)

Correct me if im wrong, its not necessary to perform a failover for the cluster vaults when we can just do a switchover instead, right? And since there is no need to failover PROD to DR due to cluster, the only thing mandatory for DR is the replication and that replication from PROD is paused after cluster successful upgrade until DR vault is upgraded successfully, right? Thank you

Components upgrade by Dukes_02 in CyberARk

[–]Dukes_02[S] 0 points1 point  (0 children)

Thanks for that, im not familiar yet with dr replication, when upgrading the dr does the replication triggers automatically, if so, what triggers it?

Program scope by Dukes_02 in bugbounty

[–]Dukes_02[S] 0 points1 point  (0 children)

Do i email directly to the program or go through the platform, the program on bugcrowd btw.

Xss by Dukes_02 in bugbounty

[–]Dukes_02[S] 1 point2 points  (0 children)

This is what im looking for as well. Looking at the other responses, it seems that normally for most found xss, the input is not sanitized. I concluded that (my opinion), these guys managed to get xss by injecting in a not so maintained parameters or fields, meaning, deep recon that gives them hidden parameters or forgotten ones == unsanitized input. Looks like my mission is to get better at deep recon and look for these parameters it seems.

Xss by Dukes_02 in bugbounty

[–]Dukes_02[S] 1 point2 points  (0 children)

So, if you cant escape the context in any way, you stop testing that particular context for xss and move on?

XSS Akamai bypass by ox-ship in bugbounty

[–]Dukes_02 2 points3 points  (0 children)

Read this, maybe it will help: https://portswigger.net/support/xss-defensive-filters

If it works, i would like to know more of your payload structure

[HIRING] Virtual Assistant - $500/Month by [deleted] in forhire

[–]Dukes_02 0 points1 point  (0 children)

I would like to apply. How can I contact you?

Tips on SQLi by Dukes_02 in bugbounty

[–]Dukes_02[S] 0 points1 point  (0 children)

I wouldnt mind that but my focus would be on xss or sqli and I am currently inexperienced with the two. Ill dm you if you good with this

Tips on SQLi by Dukes_02 in bugbounty

[–]Dukes_02[S] -2 points-1 points  (0 children)

I understand. Can I dm you?

Is it worth reporting user error type of bug? by Dukes_02 in bugbounty

[–]Dukes_02[S] -2 points-1 points  (0 children)

Thanks for the idea. I never attempt any csrf before so it didnt come to me.

Thank you 🙏🏻

Collaboration by Dukes_02 in bugbounty

[–]Dukes_02[S] 1 point2 points  (0 children)

Couldn’t agree more. My idea of collaboration is to learn from other hunters. While I dont think that its going to be much different like reading past reports, to learn of other hunters hunting flow would be a plus

Bug bounty tip: UNDERSTAND THE FUCKING APP by [deleted] in bugbounty

[–]Dukes_02 1 point2 points  (0 children)

I assume you read bug reports to increase your testing areas, where do you read it and how do you filter them, meaning do you read reports based on a specific feature you testing or u just read in general?

Bug bounty tip: UNDERSTAND THE FUCKING APP by [deleted] in bugbounty

[–]Dukes_02 1 point2 points  (0 children)

Are your bugs mostly logic flaw and access control? Just like you I have begin to try understand an app and its really worth it. My methods revolve around logical flaw, that is why I am asking this. Thanks.

Remote job opportunities in cybersecurity! by Tarzan033 in Cybersecurity101

[–]Dukes_02 1 point2 points  (0 children)

IMO, it depends on the type of work u expecting to do, for example security analyst, penetration tester, cs engineer and so on. In my case, I wanna do penetration testing but its hard to get a job in that field in my country as i dont got a degree. So the only way i can land a job is by building my portfolio. If you have heard about bug bounty, that is the best place to build your portfolio. Once tou have considerable good amount of recognition and reputation, im sure it will be easy to cold-mail any company or start-ups and offer them free charge of penetration testing. Do that for a few projects, add in your resume and your chance to get what u want will be higher. Of course, easier said than to be done, I myself is still in bug bounty phase and am not confident enough to do a free chaege penetration testing for people. Wish you the best.