π΅ MonkeHacks #48
Codebase Redesign, Celebrations, Climbing
#bugbountytips #hacktheplanet #bugbounty monke.ie/p/monkehacks...
π΅ MonkeHacks #48
Codebase Redesign, Celebrations, Climbing
#bugbountytips #hacktheplanet #bugbounty monke.ie/p/monkehacks...
SSRFs can be tough to make critical without cloud metadata, especially against a target like GitLab that strengthens its infra with every SSRF. Yet @joaxcar.bsky.social broke through with the first critical SSRF on GitLab since 2020. Enjoy our explanation from Sweden! πΈπͺ
One of my favorite bugs from last year
Here's what's in the latest issue of BBRE Newsletter π₯
Kids these days don't even know how much opportunity they have to learn hacking from actual pros.
I know there is a lot of content out there, so it can be hard to find the good stuff. But 10 years ago you had to be lucky to find at least something.
Anyway, watch this π
My videos for Flare-On 2024 are live! Watch me reverse engineer all the challenges from start to end. ππ₯³
+ Commentary video featuring SuperFashi, where we review the chals together.
* 45 hours of content
* 400+ GB of raw footage
Merry Christmas! Link: www.youtube.com/watch?v=vwW9...
β οΈChallenge time againβ οΈ
It is based on a real-world situation. Use the HTML injection to leak the flag to an external domain βοΈ
This time, send solutions in DM; we don't want to spoil the fun. I also might want to patch any obvious blunder I made creating it
joaxcar.com/xss/outer.ht...
π΅ MonkeHacks #43
Year in Review, Technique Drop, Taking Care
πIn this issue, I drop a fun technique for bypassing redirect checks in certain situations. Enjoy :)
#bugbountytips #hacktheplanet #bugbounty monke.ie/p/monkehacks...
A small code-golf web challenge (free research from you, for me), how short can you make a "fetch content and execute it inline".
There is a CSP in a meta tag.
Goal: get the content from the file hack.js and have it inserted in the page. like in the image
joaxcar.com/xss/self.html
Here's what's in the latest issue of BBRE Newsletter π₯
π«‘ 2024 YTD #BugBounty stats update:
π 7 issues Reported (4 Crit, 2 High, 1 Medium)
π° 4 issues Paid
βͺ 1 Informational
π΄ 1 OOS
Will try it, seems to be fun!
Doing some @portswigger.net advent calendar this year as well. Join me on advent.j15.se
Its not affiliated with Portswigger but it will link you to one of their chapters each day (random for max excitement)
Its created 100% using Cursor so any bugs is AIβs fault
Can I ask the reason why a RCE is a low/medium severity bug in this case? Attack complexity or scope is not core asset?
This week we've got a rare episode that is also a bit more beginner friendly!
0xLupin (of Lupin and Holmes) and @rhynorater.bsky.social breakdown some of the hacker mentality that really caused some breakthrough in their hacker growth.
Check it out!
youtu.be/yxc2jVKE-jo
Dope!
Alright, new platform so I'm going to start sharing some things that I'm excited about to keep the momentum flowing!
Rn, I think the 403 Bypasser Caido plugin from Bebiks is freaking amazing.
This is a tool to automate the bypassing of walled-off endpoints.
This plugin does 3 things right:
Any bug bounty people around? I'm creating a starter pack of people to follow but it's pretty brief currently! Let me know if you'd like to be added: go.bsky.app/GD7hKPX
π«‘
The "bug bounty hunters and content creators" starter pack is now up to 60 users! Follow this to get instantly connected to the bug bounty community & let me know if I've missed you off!
go.bsky.app/GD7hKPX
Trying to make a list of programs that have hosted a live event on hackerone
-epic games
-tiktok
-zoom
-salesforce
-uber
-PayPal
-DoD
-shopify
-airbnb
-yahoo
-Starbucks
-Amazon
Which did I miss #Bugbounty
I really needed this list! Thanks
Hello World!