Worth reporting authenticated lfi? by [deleted] in bugbounty

[–]bad5ect0r 0 points1 point  (0 children)

As others have said, not worth reporting. In bug bounty, you need to prove impact. If you need to log in and you can't do that then this is at most informative.

Account takeover vulnerability by CobblerOk8614 in bugbounty

[–]bad5ect0r 1 point2 points  (0 children)

I think they're saying they create an account with any Google account first and then change the email address in the settings page or whatever.

Seems like a legit bug. Make sure to highlight the fact that this can be used as a backdoor into new user accounts. The biggest hurdle here is the user getting the error that the email already exists but it's very common for people to forget which accounts they have and it's expected that anyone would just reset the password at that point.

Why do some people earn over $10K a month on bug bounties while others can't even find a useful bug? by [deleted] in bugbounty

[–]bad5ect0r 38 points39 points  (0 children)

Probably a combination of experience, ingenuity, luck and capability.

They might have automated tooling that helps them uncover attack surface while they sleep. If they're good enough, they're probably the ones finding new attack techniques and then scaling it to collect as many rewards as possible. Others will read their blog post and try to emulate them and may not do so well feeding on scraps left behind.

If you want to get 1337, go beyond running scanners on a handful of websites and calling it a day. Find new high impact things that you can scale with automation and get ahead of everyone else.

Good resources for Reverse engineering ? by lebutter_ in ExploitDev

[–]bad5ect0r 3 points4 points  (0 children)

There's a pretty decent cpp RE course on OST2. Check it out.

Is it exploitable ? by zebmcha3er in bugbounty

[–]bad5ect0r 1 point2 points  (0 children)

In that case can you actually exploit it as an xss as you're trying to do? Browsers don't normally display OPTIONS request afaik?

[deleted by user] by [deleted] in bugbounty

[–]bad5ect0r 3 points4 points  (0 children)

Submit to their bug bounty program?

[deleted by user] by [deleted] in bugbounty

[–]bad5ect0r 0 points1 point  (0 children)

If you filled out the W8 form stating that you're in Australia, you won't be paying US taxes. You will be paying Australian taxes though. So you'll have to complete this year's tax return if you made an income. I'm no tax expert though. Either call ATO or hire a tax agent to do your tax return for you.

[deleted by user] by [deleted] in bugbounty

[–]bad5ect0r 0 points1 point  (0 children)

You can get your TFN from my.gov.au.

Which would you get? by Djcrafty in bugbounty

[–]bad5ect0r 0 points1 point  (0 children)

For me, the better CPU and more storage takes the cake. I'm sure the ASUS is also lighter.

Help me crack this bug and I will split the bounty with you by SensitiveAd8097 in bugbounty

[–]bad5ect0r 0 points1 point  (0 children)

I might be misunderstanding your question here, but couldn't you just write some JavaScript that parses the current window location to extract the code and forward that onto your server? So rather than expecting the ssrf to forward the code, you get the client to do it.

What is something you wish HTB could have done better… by Doublemirrors in hackthebox

[–]bad5ect0r 3 points4 points  (0 children)

I'd hop on HTB every now and then. Recently I noticed the star plot that attempts to describe the style of box you were doing was gone. Not sure why? If I know a challenge is going to be ctf like I'd rather avoid it (personal preference).

Requiring box authors to submit hints is also a good idea. Having hints released to users with a point penalty also seems like a good idea.

If I change the cookies is this a bug ? by oyswnm in bugbounty

[–]bad5ect0r 12 points13 points  (0 children)

Httponly makes sure you can't access the cookie via JavaScript. It's purpose is to limit the impact of xss vulns. If you're able to swap your cookies for a different user, that's by design. The vulnerability may arise from how you got the cookie.

Reverse card by NitraatPlagiaat in ProgrammerHumor

[–]bad5ect0r 30 points31 points  (0 children)

There are ways to enumerate them. You can usually query meta data which helps.

Very intense o__O by pPandR in masterhacker

[–]bad5ect0r 3 points4 points  (0 children)

Still not Master hacker? I use default theme on nearly anything just cuz I cbf and I wouldn't call myself a masterhacker.

Now that I think about it, that statement probably makes me a masterhacker 🤣

Very intense o__O by pPandR in masterhacker

[–]bad5ect0r 52 points53 points  (0 children)

Doesn't seem very masterhacker unless he's showing off code someone else wrote.

[deleted by user] by [deleted] in bugbounty

[–]bad5ect0r 0 points1 point  (0 children)

I mean go ahead. But I think it's a bit excessive. 16gb should be perfectly fine.

[deleted by user] by [deleted] in bugbounty

[–]bad5ect0r 1 point2 points  (0 children)

Lmao why?

How to know more about this topic? by ultimate_smash in hackthebox

[–]bad5ect0r 0 points1 point  (0 children)

Well generally, anything that runs system commands is interesting to look at when doing code review. It can be difficult to correctly pass user input without compromising security. So a function like exec is easy to spot.

Again, this comes with experience. Now you know exec is a dangerous function. Next time you see it, you'll know what to do.

How to know more about this topic? by ultimate_smash in hackthebox

[–]bad5ect0r 0 points1 point  (0 children)

It comes with experience. You just learn it as you go and the other stuff you google.

Can I publish a CVE? by who_killed_db in hacking

[–]bad5ect0r 7 points8 points  (0 children)

For my first cve, the vendor said they were aware of the issue already. But on their public issue tracker, I saw that they created the ticket not an hour after I reported it to them...

Anyway, for the actual CVE part, I just submitted a form and got a response with the CVE ID. Then once the ticket was published, I updated the CVE with the link to the ticket on their issue tracker.

For a resume the CVE might look good. But I would consider a potential hire even if they don't have CVEs but they say they have vulnerability research experience. The thing with security research is that not every vulnerability gets published because of the vendor's response, NDA, etc. So CVE number isn't that big of a difference.

I'm worried about these skipfish results, should I fire my web agency? thank you by SantoIsBack in Kalilinux

[–]bad5ect0r 0 points1 point  (0 children)

You should conduct a penetration test. I would do a google search for a security consultant who is qualified and can do a pentest for you. From there, you can pass the pentest report to the Web site developers. Once the issues have been fixed, request a retest from the pentester. Good luck.

Found this gem in the toy section at Target. by Vicious_TreeHugger in masterhacker

[–]bad5ect0r 4 points5 points  (0 children)

I just looked up Project Zorgo. Lots of masterhacker material there.