hidden-endpoints

2 articles
sort: new top best
clear filter
0 3/10

Article discusses techniques and tools for bypassing HTTP 403 Forbidden responses to discover hidden endpoints during bug bounty hunting, using a tool called 403Bypasser.

403Bypasser
medium.com · ghostyjoe · 13 hours ago · details
0 6/10

A researcher discovered a URI-based XSS vulnerability in a redirect parameter (example.com/social?redirect=) using Google dorking to find hidden endpoints, exploiting javascript:// protocol handling to execute arbitrary JavaScript when users logged in after being redirected to a malicious URL.

Jatin Nandwana HackerOne Google Hacking Database Exploit-DB
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details