reconnaissance

10 articles
sort: new top best
clear filter
0 4/10

Article describes using Google dorking techniques as a reconnaissance method to discover hidden vulnerabilities and exposed information for bug bounty hunting.

medium.com · loopXvedant · 18 hours ago · details
0 3/10

Security researcher found unauthenticated Jenkins instances via Shodan, exploited the 'Manage Jenkins' configuration option to install a terminal plugin for RCE, and earned hall of fame bounties at two Fortune 500 companies.

Alfie Jenkins Shodan
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 8/10

A Salesforce API access token was exposed to users' browsers during file uploads on IKEA.com's customer support forms, allowing attackers to access unrestricted customer data via the Salesforce REST API. The token lacked proper permission scoping and revealed 465 object types accessible, including customer account names and phone numbers.

IKEA.com Salesforce Jonathan Bouman Zerocopter Amass Burp Suite Param Miner CVE-like-equivalent-not-assigned
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 5/10

Researcher found three vulnerabilities at Yahoo's Brightroll service: two RCEs via JSON injection in a message queue system (bypassing command filters using Unicode escapes), and an SSRF vulnerability in image resizing that allowed arbitrary file reads via curl flag injection. The third vulnerability was nearly an RCE but limited to file disclosure without execution.

Yahoo Kedrisec Brightroll RabbitMQ Aquatone Google AWS
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 5/10

A P1 RCE vulnerability discovered in a misconfigured Jenkins instance via Shodan reconnaissance, exploiting open user registration and exposed script console execution capabilities.

Shodan Jenkins sw33tLie
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 6/10

A stored XSS vulnerability was discovered in Edmodo's user registration flow where first and last name fields accepted unfiltered HTML/JavaScript payloads. The payload executed when viewing a user's profile through a connection search feature, enabling potential account takeover.

Edmodo Futaacm Cyber Afolic
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 2/10
bug-bounty

Security researcher discovered a reflected XSS vulnerability in Microsoft's imagineacademy.microsoft.com subdomain using a simple SVG/onload payload in the search bar, which was acknowledged and fixed by Microsoft through their responsible disclosure program.

Microsoft imagineacademy.microsoft.com hacker_eth
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 8/10

A reflected XSS vulnerability was discovered on Philips.com through enabled Adobe Experience Manager debug mode in production, allowing HTML injection via the debug=layout parameter. The attack bypassed ModSecurity and Akamai WAF by using a <body onpointerenter> tag combined with jQuery.getScript() to load external JavaScript, enabling phishing and credential theft from authenticated users.

Philips Adobe Experience Manager ModSecurity AkamaiGHost WhatWaf WhatCMS.org Aquatone Janrain Jonathan Bouman jQuery
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 3/10
bug-bounty

Security researcher found a reflected XSS vulnerability in Edmodo's onboarding parameter (school_suggestion_test_variant) that allowed arbitrary JavaScript execution within script tags, discovered through basic subdomain enumeration and parameter testing in under 3 minutes.

Ashish Jha edmodo.com go.edmodo.com knockpy
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 6/10

A researcher discovered a URI-based XSS vulnerability in a redirect parameter (example.com/social?redirect=) using Google dorking to find hidden endpoints, exploiting javascript:// protocol handling to execute arbitrary JavaScript when users logged in after being redirected to a malicious URL.

Jatin Nandwana HackerOne Google Hacking Database Exploit-DB
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details