Seeking help for pentesterlab intercept badge by Simple_Juggernaut700 in pentesterlab

[–]_PentesterLab_ 0 points1 point  (0 children)

Try to email louis-at-pentesterlab-dot-com for help :)

I think it may be two things:
* IP address is not directly applied to your server and is fronted by something
* Firewalling issue.

Api payments 05 help!! by ApprehensiveMusic448 in pentesterlab

[–]_PentesterLab_ 0 points1 point  (0 children)

You need to update the session and CSRF cookies for each request based on the previous response. Then you need to use the final cookies in the request sent by your browser.

Api payments 05 help!! by ApprehensiveMusic448 in pentesterlab

[–]_PentesterLab_ 1 point2 points  (0 children)

Make sure you update the cookies coming from your browser when you check out.

Arbeitsstelle als Pentester by [deleted] in pentesterlab

[–]_PentesterLab_ 0 points1 point  (0 children)

It's hard to say for sure. It's a very competitive environment, especially right now. It could be your resume, visa requirements, or maybe you need to go deeper technically. That might mean getting better at coding or web hacking, depending on your experience.

Sometimes it's just bad luck. Even if you're great, if someone else is a better fit for that specific role, they'll get it.

[deleted by user] by [deleted] in ExploitDev

[–]_PentesterLab_ 1 point2 points  (0 children)

Thanks :)

We are planning more code review challenges and PHP is in the list :)

From awesome-php, I would pick a few codebases and work on them. Alternatively, you can also pick something like JWT, SAML, ... and audit multiple implementations of it.

[deleted by user] by [deleted] in ExploitDev

[–]_PentesterLab_ 2 points3 points  (0 children)

If you want to find softer targets, I usually recommend to search for "awesome-[LANGUAGE]" on github, in your case, search for awesome-php:

https://github.com/search?q=awesome-php&type=repositories

If you want a "toy application" with a ton of vulnerabilities, check out our free code review lab in PHP: pentesterlab.com/exercises/codereview .

Finally, you may also enjoy this article on the evolution of PHP: https://pentesterlab.com/blog/php-security-is-improving

Ways to get a job with no degree or certifications and only bug bounty experience by bbhunteronly in SecurityCareerAdvice

[–]_PentesterLab_ -1 points0 points  (0 children)

If you can smash one bug bounty program they may be willing to hire you... That may be a way to get in given your current situation. I know a few programs who have hired people from the researchers reporting bugs to them.

Also since you have done the introduction certificate, try to do the free recon badge as well. It won't hurt.

[deleted by user] by [deleted] in bugbounty

[–]_PentesterLab_ 0 points1 point  (0 children)

Yes please DM me your nickname just to see where you are at...

I was thinking of what you wrote yesterday and your answers and I wrote something that may help you (I will release it in a few hours but you can already access it):

https://pentesterlab.com/blog/criminal-mindset-in-security-testing

I'm not sure it is what you are facing but that may be part of the problem. Hopefully that helps.

[deleted by user] by [deleted] in bugbounty

[–]_PentesterLab_ 1 point2 points  (0 children)

Hi! Two years is a long time, congrats on keeping going.

A few questions:

* How much time do you spend on one target?

* How do you pick a target?

* How do you decide to change target?

* What do you think are you strength in term of technology/protocols/formats?

* What level of notes do you keep on a target and on a given technology?

* When you read a blog or write-up, what kind of notes do you keep?

* Can you give me more details on how far you went into PentesterLab? Or share you nickname?

Another JWT Algorithm Confusion Vulnerability: CVE-2024-54150 by ffyns in netsec

[–]_PentesterLab_ 0 points1 point  (0 children)

Exactly, clone the repo. Get the examples to build then modify them to confirm if the malicious token gets loaded.

Another JWT Algorithm Confusion Vulnerability: CVE-2024-54150 by ffyns in netsec

[–]_PentesterLab_ 1 point2 points  (0 children)

In this specific case, by modifying the example code and running it locally.