PinnedWhat I learnt from reading 220* IDOR bug reports.IDOR — Insecure Direct Object Reference, abuse of the lack of authentication at every stage.Jan 25, 202211Jan 25, 202211
PinnedWhat I learnt from reading 126* Information Disclosure Writeups.Let’s tackle the most valuable and mysterious bug type…Jun 6, 20224Jun 6, 20224
@pdiscoveryio’s Katana for Bug Bounty.Katana is an incredibly built go-lang based web crawler which is a great stand alone reconnaissance tool, and also works perfectly in…Nov 27, 2023Nov 27, 2023
Bug Bounty: Wordlists — Please do them properly.You are only so good as your weakest link. And in bug bounty, most people’s weakest link, and most ignored is always their wordlists…Jun 19, 20233Jun 19, 20233
Shodan for Bug Bounty — and Why You Shouldn’t Use these 53 Dorks.Shodan is a much-loved and widely adopted attack surface management tool. But what actually is it? How do we use it beyond basic usage? and…Mar 20, 20233Mar 20, 20233
Automated and Continuous Recon/Attack Surface Management — Amass Track and DBNot using Continuous Attack Surface Management is the reason you keep getting dupes, let’s talk about it…Jan 2, 20232Jan 2, 20232
What I learnt from reading 217* Subdomain Takeover bug reports.A comprehensive analysis of Subdomain Takeovers (SDTO), DNS Hijacking, Dangling DNS, CNAME misconfigurations…Oct 31, 20225Oct 31, 20225
How I DIDN’T get an RCE in a $200 Billion company — Bug BountyI was hunting for CVE-2021–36356 on my subdomain list of over 1,000,000+ subdomains, and finally got a hit…Sep 12, 20224Sep 12, 20224
How to **actually** use Amass more effectively — Bug Bounty99% of bug hunters only use 1% of Amass’ potential…Aug 15, 20227Aug 15, 20227
Comprehensive Url Enumeration for Bug Bounty — The potential of GAU.Url Enumeration — Subset of Content Discovery: finding existing endpoints.Feb 22, 20226Feb 22, 20226
Bug Bounty Recon: Content Discovery (Efficiency pays $)Content Discovery — The process of finding vulnerable endpoints; URLs, Parameters and Resources.Jan 18, 20224Jan 18, 20224
Bug Bounty Recon: FingerprintingFingerprinting — Finding and Indexing Services and Technologies used by your target.Jan 10, 20222Jan 10, 20222
Bug Bounty Recon: Vertical Correlation (and the secret to succeeding).Vertical Correlation — The process of finding subdomains from a root domain.Jan 2, 20223Jan 2, 20223
Bug Bounty Recon: Horizontal Correlation.Horizontal Correlation — The process of finding different domains owned by the same organisation.Dec 12, 20213Dec 12, 20213