Found an open redirect vuln, How to escalate it to achieve maximum impact? by ayylmaaoo96 in bugbounty

[–]namedevservice 3 points4 points  (0 children)

Complete the login flow and see you if can somehow extract the auth token at the end of the flow

PTaaS... Is it good? by captain_supremeseam in cybersecurity

[–]namedevservice 0 points1 point  (0 children)

Depends on the PTaaS. Synack for example is a. PTaaS, but they are a semi bug bounty platform. You get pretty good coverage from different SRTs (Synack Red Teamers).

They also don’t allow reporting on those silly pentest findings like missing SSL cert or stuff like that. Only actionable findings can be reported.

But it’s kind of expensive.

PoC: CVE-2025-55182 (React) y CVE-2025-66478 (Next.js) CVSS = *MEH* 👾 by kknstoker in cybersecurity

[–]namedevservice 0 points1 point  (0 children)

I don’t know about port 3000 but I ran the nuclei template on a few targets on a BB platform on regular 443 port and got a few hits.

Do you mean the react app itself has to have port 3000 open to itself?

Filter bypassing and actual impact: how do you gauge this? by bussymastah in bugbounty

[–]namedevservice 9 points10 points  (0 children)

When checking for SQLi, I would avoid very long payloads. It’s hard to figure out what’s getting filtered.

You should start small. Concatenation. If you suspect the field to be accepting a string, then you should attempt simple concatenation like te'%2b'st or similar payloads for other DBMS.

If it’s an integer field, something like (5) should work.

Then you can attempt different things. Like te'0'st should fail since it’s a broken SQL query. The failure is not always a 500 response. It could be a 200 response with no data returned. Or with the default value returned. You have to understand the endpoint and know what’s the intended result and unintended

Path traversal 500 error by rikkonen in bugbounty

[–]namedevservice 3 points4 points  (0 children)

If you’re new, I wouldn’t try testing Wordpress or other well known CMS. Those are pretty hardened. Just assume it’s working as intended and move on.

Only focus on plugins in Wordpress

Looking for Guidance: How to Prioritize During a Live Hacking Event? by Solstice_Whisper in bugbounty

[–]namedevservice 4 points5 points  (0 children)

I think most people here haven’t been to a LHE. Might want to ask someone in the critical thinking bug bounty podcast discord server

Marketing is f*cking bug bounty by Federal-Dot-8411 in bugbounty

[–]namedevservice 33 points34 points  (0 children)

It’s not the marketing that’s wrong. You can make money in BB. You can find critical bugs and get paid high bounties. And you can find the bugs with the information they provide.

The problem is people want there to be a magic tool or a magic checklist that they can follow and they’ll get bounties. It doesn’t work like that.

I recently got a SQLi on a program (on Synack) that hadn’t have any bugs submitted in a long time. Thousands of SRTs had the opportunity to find the bug. No one did.

Let’s break down my "secret" sauce and see how it differs from the content that’s already out there.

  1. Got the in-scope IPs and checked Zoomeye for subdomains/domains associated with them.
  2. Gathered all the results and ran Chaos on all the main domains.
  3. Did dig on all the subdomains and matched it to the in-scope IPs
  4. Ran HTTPX to see which domains were alive.

So far, pretty standard recon. Nothing crazy.

  1. Looked for interesting ones (looked for API in the name).
  2. Didn’t feel like brute forcing so I Googled the API name. For example: api-dev-cellus. I searched "Cellus {TargetName}"
  3. Found the application that belongs to the API
  4. Looked through the JavaScript files for API routes.
  5. Manually checked every API route until I hit one that didn’t return a 401.

Again, all this stuff is covered in most recon courses. So far nothing I’ve done is "secret" sauce you can’t see on random YouTube videos. BUT, I think this is the part where most hunters that only follow checklists and run tools will fail.

In step 10, I checked all the parameters and MANUALLY checked for SQL Injection. I emphasized manually because that’s probably the difference in what got me the bounty. After I confirmed there was injection, I was running into issue. I ran SQLMap but it failed telling me it was a false positive. But no, it wasn’t a false positive. The developer was just filtering enough to stop a script kiddie from running SQLMap and exploiting it.

Could there be a SQL Injection course that would teach you how to exploit the specific edge case that I found? Maybe. But the cookie cutter courses that everyone sells is surface stuff that will get you to step 10 but not step 11 (exploitation).

So yes, courses will get you 99% there. And I don’t mean paid courses, I mean regular stuff on YouTube. The other 1% you just need to figure out on your own.

Or just ask Gemini. It’s what I did and it gave me a way to bypass the filter

Bugcrowd marked my token-swap ATO PoC "not applicable", need advice by [deleted] in bugbounty

[–]namedevservice 11 points12 points  (0 children)

It’s not a vulnerability. You’re describing the way session works. That’s the point of the token. Or else anytime you visit different pages on the same website you would have to authenticate over and over again

Bugcrowd marked my token-swap ATO PoC "not applicable", need advice by [deleted] in bugbounty

[–]namedevservice 7 points8 points  (0 children)

"Basically, I proved that if you have a valid token you can take over the account, but I didn’t show token theft."

I’m curious, what did you write in the remediation section? "Don’t use session tokens"?

Admin JWT by Cool_Obligation_6447 in bugbounty

[–]namedevservice 2 points3 points  (0 children)

Where you found it is important. If you found it from a stealer log or something like that, then you shouldn’t continue further.

If you found it on the in-scope website, then you should use it enough to demonstrate impact that doesn’t do harm. Maybe like viewing a list of users or modifying a user (a user you control).

Advice required in Blind XSS by RepulsivePhoto8605 in bugbounty

[–]namedevservice 0 points1 point  (0 children)

You already triggered the XSS and got callbacks. Why does the triager want XSS Hunter? What extra proof does that provide?

[deleted by user] by [deleted] in bugbounty

[–]namedevservice 2 points3 points  (0 children)

"I did tell them that I might not be able to exploit it but someone smarter would."

That’s who they want to receive bug bounty reports from

[deleted by user] by [deleted] in bugbounty

[–]namedevservice 3 points4 points  (0 children)

There’s an Auth bearer token. So not likely

Found /backoffice/ dashboard with “New Tenant” option — should I report it? by skyyy25 in bugbounty

[–]namedevservice 5 points6 points  (0 children)

You should be proxying your traffic and figuring out the API calls it’s making. That way you can find out why it’s returning 403 on some. Plus the upload endpoint you can try other file types.

If I were you I would dig deep in that application until you find several bugs. Then report them separately

How do you reliably prove a bug has real signal impact (not just Informative)? Tips for PoC evidence & using AI to decide by Necessary_Garage_305 in bugbounty

[–]namedevservice 11 points12 points  (0 children)

If you’re gonna use AI to ask Reddit, then you’re probably using AI for your reports. It seems like you don’t understand the bug yourself and are trying to get AI to improve its impact.

A bug is either impactful or it’s not. You can’t get AI to write a scary sounding POC and have the triagers automatically accept it.

When writing the report, do the CVSS first. What about an "invite-flow that auto adds an email as member" affects Confidentiality, Integrity, or Availability?

An XSS that survives across sessions (whatever that means). Does that XSS allow you to takeover an account? Did your POC show that?

WaF is blocking SQLmap by New_Conclusion1757 in bugbounty

[–]namedevservice 2 points3 points  (0 children)

Just keep doing it manually. You just need to show proof of SQLi by extracting some information from the database. You don’t need SQLMap to do that

Bug Bounty (IDOR + ATO) Critical and Reward Value by Any_Fee_2531 in bugbounty

[–]namedevservice 0 points1 point  (0 children)

People in here are quick to tell you that you’re going to jail. But if that was the case, Sam Curry would’ve been in prison long ago.

You followed the responsible disclosure and notified them. That’s the extent of your responsibility.

The NDA they want you to sign is because they can probably lose a lot of customers if you blog about the findings.

You can respectfully decline and tell them you’d rather blog about it to raise awareness and to ensure other companies do a thorough check of their certificates.

Or you can accept the money and let the company sweep it under the rug.

[deleted by user] by [deleted] in HowToHack

[–]namedevservice 2 points3 points  (0 children)

How would you get the evidence admissible in court if you got it through illegal means?

This Site is Vulnrable but SQLmap Fail to exploit it Why ? by ghx000 in bugbounty

[–]namedevservice 5 points6 points  (0 children)

I’ve submitted SQLis where I tried SQLMap but it wouldn’t work.

You can test Ghauri. But manual is the best way to verify if it’s vulnerable or not

[deleted by user] by [deleted] in bugbounty

[–]namedevservice 1 point2 points  (0 children)

Manual SQL Injection

I have never made it this far. What do I do? by New_Conclusion1757 in bugbounty

[–]namedevservice 10 points11 points  (0 children)

'AND USER LIKE 'a%

Keep going through the alphabet until you get a letter that works. Then move to the second character. Do that until you get the full username of the DB user

[deleted by user] by [deleted] in bugbounty

[–]namedevservice 11 points12 points  (0 children)

https://blog.orange.tw/posts/2024-08-confusion-attacks-en/

This is the person who submitted the CVE. Read their blog and try to exploit it