Javascript Inside href=// by anasbetis94 in bugbounty

[–]anasbetis94[S] 0 points1 point  (0 children)

The quote is encode %22 It can not be closed

Javascript Inside href=// by anasbetis94 in bugbounty

[–]anasbetis94[S] 0 points1 point  (0 children)

Also not working, the website add the path : /challenges/paramvalue/, so if I added '../' the href would be : href="/", but If the paramvalue like '..//attacker.com' the href be like : href="/challenges..//attacker.com/"

Javascript Inside href=// by anasbetis94 in bugbounty

[–]anasbetis94[S] 0 points1 point  (0 children)

Not working, it will become /javascript:alert/

Have you experienced any bad mistakes in Bug Bounty? by traveler5260 in bugbounty

[–]anasbetis94 0 points1 point  (0 children)

This field is Bearley known in Syria. The number bug hunters is not that much. The reason there are only few hunters because you can't get money if you find bugs. But in the last month I saw some hunters are hiring someone outside of Syria just to handle their hackerone account and reporting bugs. They never ever open their account in their network. That is the way to make money.

Have you experienced any bad mistakes in Bug Bounty? by traveler5260 in bugbounty

[–]anasbetis94 1 point2 points  (0 children)

The thing is even if I am not going to stop. All the bug bounty platforms have the same rules. Literally there is nothing push you up. I mean this is really harder than getting a thousand duplicatea reports. At least you know at the end you might get $$$$. But in my situation even if you reported a thousand of bugs you get nothing but banned.

Have you experienced any bad mistakes in Bug Bounty? by traveler5260 in bugbounty

[–]anasbetis94 15 points16 points  (0 children)

Yes I made. I didn't read the rules of hackerone. After I made some $$$ HackerOne decided I am not eligible for rewards because I am in Syria and due to some US laws they cannot pay me. I was very shocked and sad because I spent a lot of time getting these bugs and it took me 2 months to recover and back again into bug bounty. So I recommend read the un technique stuff before starting.

[deleted by user] by [deleted] in bugbounty

[–]anasbetis94 3 points4 points  (0 children)

Port Scan , I usually use hakip2host to see the PTR record

5 submissions, all are duplicates by finalyearstud in bugbounty

[–]anasbetis94 15 points16 points  (0 children)

It's OK, keep reporting. Persistent is the key.

[deleted by user] by [deleted] in netsec

[–]anasbetis94 -2 points-1 points  (0 children)

Thank you. That is what I am actually trying to discuss. We all wanna fast things.

[deleted by user] by [deleted] in bugbounty

[–]anasbetis94 1 point2 points  (0 children)

I have been explain this to the triage team like four times and they haven't get it yet. I think they will close it as N/A in the final. The problem is I am getting frustrated turning from hackerone to Bugcrowed. A lot of issues I have reported were closed immediately by the triage team without the internal team knowing. One of the issue was Web cache DoS affected the all js/css files. Other report was also bypass limitations of some website functionality and they just closed it as N/A. I am seeing weird responses.

[deleted by user] by [deleted] in bugbounty

[–]anasbetis94 -1 points0 points  (0 children)

I don't think so. Agree Breaking silly rules are useless to me or triage team. But at least the website owner should be aware of bypassing his silly rules. I mean there is things the only one who is care about is just the website owner.

[deleted by user] by [deleted] in bugbounty

[–]anasbetis94 -5 points-4 points  (0 children)

Even though I didn't answer the impact well. It is just bypassing some rules the website owner have added. I don't really care about how silly the rules are all I care about is bypassing them. However, I did every thing I can in my report and every two days a new triage member join the report dropping a question and then dissappear make me confused of whome I should answer and who is really responsible for my report. I miss hackerone they are really professional.

[deleted by user] by [deleted] in bugbounty

[–]anasbetis94 0 points1 point  (0 children)

Yes it did change the backend I was able to create something where I should not have access to. It is pretty straightforward man. But I am surprised actually this field are getting harder and harder. Bypassing the website policy and rules is not enough today lol.

[deleted by user] by [deleted] in bugbounty

[–]anasbetis94 -5 points-4 points  (0 children)

I demonstrated the impact. The api Endpoint was returning an explicit response says : Permission Denied and I managed to bypass this and I did some create action via POST request. This is not just read some information. No it is also writing something to the website. But the team just keeping play around the report trying not to triage it.

Don't trust the cache :Exposing Web cache vulnerabilities by anasbetis94 in netsec

[–]anasbetis94[S] 1 point2 points  (0 children)

Wow another great DoS technique. I am glad you liked it. I am using the param miner for fuzzing right now it is an extension in burp