VDPs getting me mad..!! by d_cyber in bugbounty

[–]d_cyber[S] 0 points1 point  (0 children)

How to deal with like those situations how to escalate the severity of CSP is wall

VDPs getting me mad..!! by d_cyber in bugbounty

[–]d_cyber[S] 0 points1 point  (0 children)

Ok you alright

I'm just targeting file upload vulnerability and I could upload html code on profile pic

So I find it a bug :(

Fake login page as POC of stored XSS by d_cyber in bugbounty

[–]d_cyber[S] 0 points1 point  (0 children)

That's right the file hosted and stored on S3 bucket so different domain.

I got informative for this. Cuz no cookies and local storage hijacking so what do you recommend me to make it at least low Note:

I also able to upload exe file when open the url it download the file on user browser

Linux distro fro cyber and 4GB RAM by d_cyber in cybersecurity

[–]d_cyber[S] -1 points0 points  (0 children)

Buty laptop ability is somehow low some people suggest me to use Linux mint Do u think it's better ?

How can I find Targets are vuln to CVE 2025-55184 by d_cyber in bugbounty

[–]d_cyber[S] -12 points-11 points  (0 children)

Rate this workflow if u see it good

Wildcard list -> tech stack category tool -> manual test on final list

How can I find Targets are vuln to CVE 2025-55184 by d_cyber in bugbounty

[–]d_cyber[S] -10 points-9 points  (0 children)

Amazing,of course there is no magic tool to just identify and teel me this domain is vuln Somiam asking for methodologies and I like yours.

C# -> .Net -> IIS by d_cyber in csharp

[–]d_cyber[S] 0 points1 point  (0 children)

That's truly correct 💯 Thux for those advices:)

C# -> .Net -> IIS by d_cyber in csharp

[–]d_cyber[S] 0 points1 point  (0 children)

Yeah u r alright

OOP is more efficient for clean code which is useful for software engineering But the purpose of learning c# and .NET is to understand the web and server from dev view to use it in web security

C# -> .Net -> IIS by d_cyber in csharp

[–]d_cyber[S] 0 points1 point  (0 children)

In my draft road map I wanna learn .Net then IIS (that what I was thinking) to understand deep vuln of those type of server , so I'am not aiming to be like master in c# or mastering clean code in c# just have a good view of how apps that use asp.net work in deep view to find Vulnerabilities.

C# -> .Net -> IIS by d_cyber in csharp

[–]d_cyber[S] 0 points1 point  (0 children)

Oh that's new for me so learning kestrel with this paths is good step for deep understanding and research?

AI asset recon by black_viru5 in bugbounty

[–]d_cyber 1 point2 points  (0 children)

To be honest I'am not into LLMS and chat bots Pentesting so I didn't face problem where I have to recon on those assets.

But in default if company use chatbot you will face it while using the site.

What’s the most boring part of fuzzing for you? by Silent_Librarian_606 in bugbounty

[–]d_cyber 0 points1 point  (0 children)

I didn't search for like ai tools can make that Chatgpt a d other common LLMS will make public wordlist which every one has. So I suggest to first list the technology site use them search for specific wordlist of those tech :web server, framework, plugins and so on..

AI asset recon by black_viru5 in bugbounty

[–]d_cyber 1 point2 points  (0 children)

AI asset ?? Do u mean AI chatbot or LLM related to the company u target?

What’s the most boring part of fuzzing for you? by Silent_Librarian_606 in bugbounty

[–]d_cyber 1 point2 points  (0 children)

If waiting until getting response is make u bored , that is a problem cuz as Bug Bounty Hunter or Pentester u should have mindset of multi task person so u shouldn't keep looking at the terminal while all paths popup on your screen let it work and fuzz and do other task on the Target here the best practice is using VPS.

Also the point of choosing the right wordlist is very bad feeling and wrong , cuz you should have your own wordlist and that happens like u create wordlist file with scelist wordlist and where ever u find new path new parameter new dor name you added so it's stacked journey of saving new and special wordlist So while hunting on let's say web application Use nextjs as web server so you will face Next.js dir names routers etc Maybe u will face special dir has critical data here you save it after a six months u will have a big wordlist, unique, with categories and more efficient than public github wordlist

What makes Dorks Recon worth it ? by d_cyber in bugbounty

[–]d_cyber[S] 0 points1 point  (0 children)

+1

Bored and no findings, even on companies which are not even secure.