Abdullah Nawaf (HackerX007)🇯🇴 Profile
Abdullah Nawaf (HackerX007)🇯🇴

@XHackerx007

Followers
6,384
Following
184
Media
101
Statuses
404

Hackerx007 Bug hunter FB/Twitter/Mail.ru HOF 58 Bugcrowd rank 7 Bugcrowd P1 rank with 110 p1 :) In love with P1 ;)

Hashemite Kingdom of Jordan
Joined February 2021
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 months
We earned $35,000 in total with @GodfatherOrwa for submissions on @bugcrowd #ItTakesACrowd #Tip : command `ffuf -w /subdomain_megalist.txt -u ' https://XXXFUZZ[.]target[.]com/' -c -t 350 -mc all -fs 0` also ` https://FUZZXXX[.]target[.]com/`
17
80
370
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
4 months
we @GodfatherOrwa earned $20,000 for Our submission on @bugcrowd Tip:Again,dont ignore`javax.faces.ViewState`;specially if it start with `H4sIAAA` or `rO0A` for more info see best luck :) #ItTakesACrowd #bugbounty #BugBountytips
10
65
324
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
Nice and Fast P1 in my fav prorgam ❤️️️ dirsearch> /accesslogs/ (add it to your dirlist) > directory listing> Logs file > 700 users and admins password Disclosure :) Good luck :) #bugbounty #bugcrowd #bugbountytips
6
93
317
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
I earned $7,500 for my submission on @bugcrowd with @GodfatherOrwa #tip : Found admin[.]target[.]com>no thing in github>reading js>found an other domain with the same back-fornt end>admin.devtarget[.]com>searched in github>found user,pass>worked>Auth Bypass
8
43
226
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
2 years
It was auth bypass in Admin panel That leads to multiple bugs RCE,LFI,SQLI,ATO Write up soon @GodfatherOrwa @Bugcrowd #BugBounty
9
11
177
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
2 years
2 tips here are more important than hacking tip :) * Choose someone you trust * There should be a program that you can called it ( Fav program ) we spent months in this program and here are some bugs we found * Auth Bypass 15k * RCE 16k * SQLI 15k #bugbountytip #bugcrowd
9
17
156
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
2 years
I earned $2,500 for my submission on @bugcrowd with @GodfatherOrwa #TIP Add this ends to your list /log/production.log /config/app_env.yml If you were lucky enough You will find a lot of juicy information #ItTakesACrowd #bugbounty #bugcrowd #bugbountytips
4
32
126
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
5 months
@GodfatherOrwa @Bugcrowd When u see `javax.faces.ViewState`,always test it using `jexboss`using this command`python3 -u xxx --cmd "Your OOB Command " --app-unserialize`,also use`Java Deserialization Scanner`by scanning `javax.faces.ViewState`to find the right`gadget` best luck :)
1
18
87
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
Always work with someone you trust, collaboration is so helpful But with the right person❤💯
2
3
77
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
Response manipulation is becoming popular than past Login with a valid username (use random password) ~ inspect the response ~ change "login: false" to true, auth bypass, that leads to PII disclosure,BAC Good luck :) #bugbounty #bugcrowd #bugbountytips
3
22
74
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 months
For everyone asked me about the command `ffuf -w /subdomain_megalist.txt -u ' https://XXXFUZZ[.]target[.]com/' -c -t 350 -mc all -fs 0` also ` https://FUZZXXX[.]target[.]com/`
2
13
71
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 year
It was a great bug From logs to auth bypass to lfi,PII #bugbountytips : Dont stop in just one impact Try to escalate and chains bug to get the most impactfull bug #bugcrowd #bugbountytip #bugbounty
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
me & @XHackerx007 earned $35,000 for our submission on @bugcrowd #ItTakesACrowd live is good , bounty is good thanks for @bugcrowd triaged team for quick triage from @sh_timmy
55
24
428
3
1
61
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
How my friend got a Rce, sqli in Facebook❤️ And another Authentication Bypass by me ♥️ Orwa is one of my Best friends He started with nothing only with GitHub leaks, In few months, just few He made his way in Facebook hof With sqli rce He love to learn more, working hard❤️
2
4
54
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 months
London ❤️ @GodfatherOrwa
@GodfatherOrwa
Godfather Orwa 🇯🇴
3 months
Tweet media one
6
0
89
2
0
52
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
In most of cases, you should be authenticated, In rare case you don't have to if you should be authenticated you can go to target[.]com/libs/granite/core/content/login.html in try one of this AEM default credentials in my case it was anonymous:anonymous
0
15
47
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 year
Work in silence let success make the noise 🚀🚀💥
1
1
29
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@GodfatherOrwa @Bugcrowd Response manipulation is becoming popular than past Login with a valid username (use random password) ~ inspect the response ~ change "login: false" to true, auth bypass, that leads to PII disclosure,BAC Good luck :) #bugbounty #bugcrowd #bugbountytips
1
5
27
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 month
I've learned to lose I've learned to win I've turned my face against the wind❤️🔥
1
0
27
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
4 months
To London with @GodfatherOrwa It would be nice to meet any bug hunters there❤️
@GodfatherOrwa
Godfather Orwa 🇯🇴
4 months
Next week i will be in UK (London) with @XHackerx007 if anyone there let’s meet ✌️ will be happy to meet persons from our comenity
6
1
80
1
0
26
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 year
It was a great event ❤️❤️ With great team❤️❤️ @ArmanSameer95 @codecancare @GodfatherOrwa @haxor31337 Thanks for @Bugcrowd @drunkrhin0 ❤️❤️❤️ #bugcrowd #BugBounty
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Yah We earned $10.000 and win the hacker cup on @bugcrowd #ItTakesACrowd Tess’s Squad @GodfatherOrwa @ArmanSameer95 @haxor31337 @codecancare @XHackerx007 #hackercup #teamhunt #bugbounty Other teams you did a great job ❤️ The challenge was hard all the time Big thanks all
Tweet media one
35
16
317
0
0
18
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 months
@Kettavan_kumaru see this lists
1
2
17
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
19 days
Just look at what Israel is doing! #Gaza_Holocaust #SaveRafah
0
8
15
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
Even "anonymous:anonymous" don't give you a lot , But it could help you to execute commands in groovyconsole
0
2
13
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 month
@SuppressedNws
Suppressed News.
1 month
🚨BREAKING: NEW FOOTAGE SHOWS ISRAELI ARMY MASSACRED PATIENTS AT INDONESIAN HOSPITAL ⚠️Warning: Graphic Footage. New details have emerged regarding the siege by Israeli forces on the Indonesian Hospital in the northern Gaza Strip on November 20, 2023. Reports indicate that
607
13K
16K
1
2
13
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@tnt4dz @codecancare @GodfatherOrwa @h4x0r_dz @ADITYASHENDE17 @infosec_90 @r00t_nasser @Alra3ees Dose luck do dirseach? Dose luck Bypass the waf? Dose luck find sqli? Nope Luck not helping You skills Dose و كله بتيسير من رب العباد
1
1
12
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@TheMsterDoctor1 When you copy And paste something Please edit the post When i shared this tip, i made a mistake in (prorgam) it should be (Program) fix it 😉🙃
3
0
12
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 year
@Bugcrowd @codecancare @GodfatherOrwa @haxor31337 @ArmanSameer95 Look we all in Tv😂❤️ Great team i enjoyed with u guys Thanks @Bugcrowd for this great event ❤️
1
0
11
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@haxor31337 @Bugcrowd @bsysop Nice one! I really loved this new feature from bugcrowd (collaboration in private bbp if your friend invited too) By the way, I think we work in the same program😂 Good luck ❤
2
0
11
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
8 months
Are they terrorists?!!! This world so blind to see the truth ! #Gaza_under_attack
1
3
11
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 months
@Bugcrowd @GodfatherOrwa What about me ? :)
3
0
11
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@Masonhck3571 I have been bug hunter for 1.7 year In this 1.7 I daily open H1 hacktivity reading new reports, writing new notes Every day, before I start hacking This helped me a lot ❤
2
1
10
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
2 years
Great Thing :)
0
0
8
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
8 months
All of them stand on the wrong side ? Think Again! #Gazabombing #GazaUnderAtack
@jacksonhinklle
Jackson Hinkle 🇺🇸
8 months
🇵🇸 The world stands with Palestine, even if you don’t see it in the news!
648
8K
20K
0
2
9
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
8 months
If you support Israel, do both of us a favour and consider unfollowing / blocking me +1
@rana__khalil
Rana Khalil 🇵🇸
8 months
If you support Israel, do both of us a favour and consider unfollowing / blocking me.
0
109
828
0
2
8
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 year
❤️💪
@Bugcrowd
bugcrowd
1 year
Congratulations and a big thank you to everyone who participated in the #HackerCup2022 ! 👏 In 1st place, taking home $10,000, awesome swag, and bragging rights is... ⤵️ 🥇 Tess's Squad with 5925 points! #BCTeamHunt
Tweet media one
9
8
75
0
0
9
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 months
@0x_rood Hi @0x_rood thx mate about the condition it depends for E.G of the response was 301, u should match 301 and replace it with 200 , or 302 ...etc , sometimes 401,or 402 also redirects headers like `Location` and also in the HTML response
0
2
9
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 year
My friend on TV😂❤️💥🇯🇴
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Iam on TV 😍 Thanks @Bugcrowd the best platform and best team ❤️
26
13
349
1
0
9
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
It's started, LET THE PARTY BEGIN !🔥 @Bugcrowd I will win in this 😉🔥
@Bugcrowd
bugcrowd
3 years
you know what we think? #bughunters deserve gifts 😍 Follow the link before to learn how you can be entered into our MONEY TALKS GIVEAWAY simply for doing what you already do best; #bughunting 🐛 #hacking #bugbounty
1
6
34
2
0
8
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@intigriti @nginx Line 6; It should be /reports/ This is a common Nginx misconfiguration called NGINX Alias Traversal
1
1
8
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@Bugcrowd Auth Bypass
0
1
8
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@haxor31337 Thank you ♥️ Sometime the crictal impact bugs can come with easy exploit In program i reported rce just by puting in the paramter value ";id" Like Paramter=1;id, and it was not oob or blind 😂
1
1
8
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
2 years
@GodfatherOrwa @waseyuddin @Bugcrowd It was a great year working with you my bro❤️ 2022 will be a great year for us Get ready ;)
0
0
6
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 months
0
2
7
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
8 months
Few people laughed, few people cried, Most people were silent.
0
0
6
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@GodfatherOrwa @Bugcrowd @Masonhck3571 @taulantbajramii @sh_timmy @codingo_ The most important Tip here is not every Crictal impact bugs need to be hard Sometime it could be very easy to find 😉
1
0
5
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
8 months
#SaveGaza #Gaza_under_attack The world so blind to see the truth!
0
1
6
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
23 days
1
0
6
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 months
@_2os5 For example: U find RCE in Admin[.]target[.]com and it fixed U will FUZZING like AdminFUZZ[.]target[.]com U maybe find AdminDev[.]target[.]com and it have the same RCE
1
1
5
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
4 months
@AyushSingh1098 @GodfatherOrwa @Bugcrowd Thx mate, but the pdf not mine , aslo u can see this one and this
1
1
5
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@GodfatherOrwa @Masonhck3571 We always talk about how @Masonhck3571 @taulantbajramii are Amazing، doing great work ❤️
1
1
5
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
8 months
Is this a terrorist baby? Does he carry a weapon? What is his fault? #Gaza_under_attack
1
2
5
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 year
@h4x0r_dz The View !!!!❤️❤️❤️❤️❤️
0
0
4
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
4 months
@h4x0r_dz And No one care mate, no one !!! That bad
0
0
4
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
8 months
Just no one talk about That !
@CensoredMen
Censored Men
8 months
🇵🇸🇮🇱 Retired IDF soldiers talk about their experience in the Israeli military and laugh as they do so. “One of the soldiers r*ped a 16-year-girl *laugh*” “He put Palestinians in a cage and killed them” “Soldiers chased villagers with flamethrowers and set them on fire” “If I
3K
30K
52K
0
0
4
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@0xMstar Same here :(
0
0
4
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 year
@sh_timmy @Bugcrowd Thanks Tim I really appreciate it Nice to see you guys in im my reports U and @RelentlessT7 @Masonhck3571 That made me feel great ❤️❤️
0
0
4
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@h4x0r_dz @GodfatherOrwa @Bugcrowd It is 😂 I even heard that you found some like this in Dropbox 😂❤
1
0
3
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
2 years
@GodfatherOrwa @Bugcrowd Great my mate; the year is not over yet ;) still 3 months and an rce triged 😂
1
0
3
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 months
@awaisaskanii For example: U find RCE in Admin[.]target[.]com and it fixed U will FUZZING like AdminFUZZ[.]target[.]com U maybe find a AdminDev[.]target[.]com and it have the same RCE
0
0
4
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@d3tonator @Bugcrowd @BugcrowdSupport @Infoseckaran By the way, Bugcrowd says "points" NOT Point 🙃
1
0
4
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
1 year
💪🔥❤️
@NCSCJO
NCSC JO
1 year
مقتطفات من حفل إطلاق "منصة مكافأة الثغرات واختبارات الاختراقات الأردنية"والتي أطلقها #المركز_الوطني_للأمن_السيبراني يوم الإثنين الموافق ٢٢ أيار، ٢٠٢٣ بالتعاون مع شركة أكتوبيان سيكيوريتي #NCSCJO #bugbounty
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
0
9
1
0
3
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
1
0
2
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
2 years
@haxor31337 @Bugcrowd Congratulations mate :) U doing so great ❤️❤️❤️
0
0
3
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 months
@iirode0 In Amazon 1_Choking Rescue Device for Kids and Adults, Arixmed Anti Choking Device, Portable Airway Suction Device, First Aid Choking Device 2_Automatic Choking Rescue Device for Kids and Adults with 3 Masks
0
0
3
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@GodfatherOrwa You're tweeting from iphone So you already Have a lot of money Sir! 🙃
1
0
2
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@caseyjohnellis I didn't report anything related to this cve As a full-time bug hunter,I prefer to wait for 15-30 days then start to test for new cve, This would give programs time to fix their bugs I think this is the best practice for any new cve as a bug hunter BTW I don't love easy wins :)
0
0
3
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
8 months
@h4x0r_dz Agree 👍 ✌️
0
0
2
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
7 months
@Byoussef
Bassem Youssef
7 months
What’s a proportionate response?
2K
58K
107K
0
2
3
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
2 years
@disnhau @GodfatherOrwa @Bugcrowd The Main bug was auth bypass to admin panel, P1 of course, But I decided to dig deeper in this panel, I found rce sqli ..etc , so auth bypass P1 But when you find RCE it also will still as p1 but the payout will be more since the impact not only auth bypass
0
0
3
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@GodfatherOrwa @Bugcrowd @waseyuddin @CookiesHttpOnly @aditi_singghh @Th3G3nt3lman My Best friend ♥️ Nice to work with you ♥️ You doing so great job ♥️ Keep going ♥️
1
0
1
@XHackerx007
Abdullah Nawaf (HackerX007)🇯🇴
3 years
@haxor31337 I wish you will be better than me❤ Btw, you are also my inspiration ❤
1
0
3