3NVZ
@YourFinalSin
Followers
4K
Following
1K
Media
53
Statuses
788
Dark Artist in the Making.
California
Joined August 2024
Not focusing too much on Bugcrowd these days, but made it to Top 10 US the first time for the month of October with 55 Points! 💥 https://t.co/RvRDujqdsp
0
1
62
Just found this excellent talk about DNS Rebinding and data exfiltration by @_danielthatcher. This can be highly useful in blind SSRF scenarios as well 💥 https://t.co/N4z8pkq3RT
0
20
153
Was dealing with WAF and CSP bypasses the last few days to escalate XSS issues and found these to be helpful: - https://t.co/JrjBm9Q9fO - https://t.co/hYm43oY9cw -
1
10
97
Just found this pretty nice writeup about an XSS on Proton mail by @SonarSource They bypassed some filtering, iframe sandbox and CSP. It's pretty crazy that they got only $750 for this: https://t.co/sUgFfVCbSI
2
17
96
Came across a pretty nice SSRF resources today about Next.js middleware: https://t.co/UfTFvLKF1F They also made a CTF for this, where you can see it in action: https://t.co/dFkOVleUzu
2
17
116
Don’t compare yourself to others, but to the person you were 6 months ago. Keep going bro, you got this ✌️
2
8
81
Just got multiple reports triaged just by focusing on business impact. 💥 Tip: Understand what the app is about, what data the company cares about and try to leak that specific data. Sometimes it can be as simple as a name
2
6
105
https://t.co/VXqJ44OQeT I usually don't post my bounties anymore, but since I made a post about this specific case - Here it is 🫡
Just found an unauth SSRF, I accessed cloud metadata with💥 1. Found a sub that used a third-party framework 2. Got the source code of the framework on GitHub 3. Code base had a SSRF sink that took in controllable input 4. Checked live target -> Access to internal/cloud metadata
16
12
306
Just found an unauth SSRF, I accessed cloud metadata with💥 1. Found a sub that used a third-party framework 2. Got the source code of the framework on GitHub 3. Code base had a SSRF sink that took in controllable input 4. Checked live target -> Access to internal/cloud metadata
16
10
244
For anyone interested in Desktop Application Hacking - I found this talk to be a nice introduction: https://t.co/OvybLdBQAU
3
26
218
Here is the full writeup on my full Bug Bounty Challenge, I documented. I hope this will answer all questions I keep receiving: https://t.co/MIoW3xG9Zc
medium.com
Upon multiple requests, I will summarize my bug bounty journey here for you.
3
29
203
Was looking today into Cache Poisoning/Deception and found these resources, which I think are going to be pretty helpful: https://t.co/kEXcZnxMib
https://t.co/ROFMMia51C
4
30
168
Just achieved a full ATO via XSS by bypassing Cloudflare WAF Credits to @KN0X55 The payload that bypassed the WAF was:
5
15
257
but I also want to get into research and more low level stuff - Still going to keep working hard every day and I will still keep posting, if I find something interesting - There are also still 3 payouts pending which will be 2-3k USD - Writeup will follow.. Thanks to everyone ✌️
3
0
35
Day 150 - Bug Bounty - Today will be my last post for this challenge, because I’ve achieved already all the goals I wanted to achieve - I’m thanking everyone who followed along and I thank @techycodec08 who I got the initial idea from - I will keep bug bounty hunting, 1/2
23
1
173
Day 149 - Bug Bounty - Got paid for one issue today 🎉 - Also found an access control issue on a main app in combination with a low entropy token - Kept trying to go for a RCE on an open-source program, without success so far Total earned so far: $5650
4
8
273
Day 148 - Bug Bounty - Exploited today a Paddle Oracle which was pretty interesting and new - Did source code review and found a promising reachable sink, which I kept working on - Continued working on my source code lead automation Total earned so far: $5425
4
2
87