credential-extraction

3 articles
sort: new top best
clear filter
0 2/10

A bug bounty hunter discovered admin panel access through SQL injection by enumerating historical URLs with waybackurls/gau, filtering for SQL injection patterns with gf, testing with a private tool, extracting admin credentials from the database, and finding the login panel URL in website source code.

waybackurls gau gf httpx Ratnadip Gajbhiye
medium.com · kh4sh3i/bug-bounty-writeups · 20 hours ago · details
0 3/10

A researcher discovered SQL injection on a subdomain to extract admin credentials, then leveraged those credentials to access phpMyAdmin on a different subdomain and achieved remote code execution via a PHP shell upload using MySQL's INTO OUTFILE command.

Jerry Shah HackerOne BugCrowd crackstation.net pentestmonkey.net MySQL
shahjerry33.medium.com · kh4sh3i/bug-bounty-writeups · 20 hours ago · details
0 8/10
vulnerability

A complete SSRF-to-RCE exploit chain on AWS Elastic Beanstalk that leverages the EC2 metadata service to extract IAM credentials, then uses those credentials to upload a PHP web shell to an accessible S3 bucket for remote code execution. The attack demonstrates how weak IAM policies can enable escalation from SSRF to full system compromise.

Youssef A. Mohamed GeneralEG CESPPA Squnity Synack AWS Elastic Beanstalk AWS Systems Manager AWS CLI 169.254.169.254 aws-elasticbeanstalk-ec2-role AWSElasticBeanstalkWebTier
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details