bug-bounty448
google355
microsoft312
facebook262
xss238
apple179
malware174
rce149
exploit124
bragging-post101
cve99
account-takeover93
phishing83
csrf79
privilege-escalation77
stored-xss65
supply-chain65
authentication-bypass63
dos60
reflected-xss57
browser57
react50
cloudflare49
reverse-engineering48
input-validation48
cross-site-scripting48
access-control47
smart-contract45
docker45
aws45
node44
ethereum43
web343
sql-injection43
web-security42
defi42
web-application41
ssrf38
burp-suite35
idor34
vulnerability-disclosure34
race-condition33
info-disclosure33
html-injection33
smart-contract-vulnerability32
oauth32
cloud32
writeup32
buffer-overflow32
pentest30
0
7/10
bug-bounty
Researcher discovered a subdomain takeover technique by exploiting an improperly configured S3 bucket that allowed unauthenticated write access via AWS CLI. By uploading a malicious _redirect.html file with proper ACL permissions, the attacker could execute arbitrary content on the victim subdomain without exploiting a traditional subdomain takeover vulnerability.
s3-bucket-misconfiguration
subdomain-takeover
aws-security
cloud-storage
access-control
file-upload
aws-cli
bucket-policy
bug-bounty
AWS
Amazon S3
MuhammadKhizerJaved
HackerOne
Bugcrowd