ozgur_bbh Profile Banner
Ozgur Alp Profile
Ozgur Alp

@ozgur_bbh

Followers
7K
Following
954
Media
53
Statuses
816

All you need is a simple bug.

Joined January 2020
Don't wanna be here? Send us removal request.
@ozgur_bbh
Ozgur Alp
6 days
RT @Dinosn: Interesting approach. The redirect seem to google calendar but it actually points to ' , where the lin….
0
6
0
@ozgur_bbh
Ozgur Alp
2 months
RT @niksthehacker: An amazing time in live hacking event in #hongkong with @mcipekci @ozgur_bbh @Dinosn @turakbusra @A_Burak_Gokalp @ryanr….
0
3
0
@ozgur_bbh
Ozgur Alp
10 months
RT @AlicanKiraz0: Hi everyone! After a long period of work, I have completed the full analysis of the incident in Lebanon, as well as a det….
0
16
0
@ozgur_bbh
Ozgur Alp
1 year
RT @SynackRedTeam: Synack Red Team (SRT) member @ozgur_bbh dives into two two real-world MFA bypass techniques via response tampering that….
0
16
0
@ozgur_bbh
Ozgur Alp
1 year
RT @InfoSecComm: 🔥 107th edition of IWWeekly is LIVE 🔥. Read here:
0
7
0
@ozgur_bbh
Ozgur Alp
1 year
Check out my latest technical post published at @synack blog, titled as “Multi-factor Authentication Bypass Examples via Response Tampering”.
Tweet media one
www.synack.com
Attackers are looking to compromise user accounts and are increasingly keen to find ways to bypass multi-factor authentication.
1
22
97
@ozgur_bbh
Ozgur Alp
1 year
I started seeing BigQuery SQL database more often at the applications that I tested. While it has a similar technology to other DBMS'es, it still has a unique syntax for exploitation. Here is my blog post from 2 years ago in case you missed it.
link.medium.com
Last year, we (My researcher partner on this topic, Anil and me) and found a SQL injection vulnerability on a target at Synack which was…
2
31
104
@ozgur_bbh
Ozgur Alp
1 year
Do you want to dive into the bug bounty platforms but still struggle how to start? Here is my non-technical advisory blog post from 2.5 years ago that I recommend all people who is interested to start bug hunting or newbie at the sector. Link:
link.medium.com
I got lots of questions and requests especially from new beginners to the area, so wanted to prepare a blog post regarding how to start at…
1
19
102
@ozgur_bbh
Ozgur Alp
1 year
Do you have a blind error based SQL injection, which you cannot exploit further? If that's the case, here is my blog post titled "Turning Blind Error Based SQL Injection Into An Exploitable Boolean One" which covers an additional technique to exploit.
link.medium.com
While I was recently hunting on a promising host target, from my well configured (only checking SQLi) active scan results, I found out a…
1
60
171
@ozgur_bbh
Ozgur Alp
1 year
If you are testing an application which is integrated within AWS document services and S3 buckets; here is my vulnerability write-up from 4 years ago which allowed me to view all sensitive files within bypassing the document signing mechanism.
link.medium.com
While I prefer more to write/talk about far-going topics instead of just one vulnerability write-up, I decided to make an exception for…
0
49
190
@ozgur_bbh
Ozgur Alp
1 year
Do you want to find different type of vulnerabilities that automatic scanners mostly missing? Here is a blog post that I wrote 3 years ago about Load Balancer, Shallow Copy and Cache problems that causes data leakages, resulting even account takeovers.
link.medium.com
When looking for security vulnerabilities on a web application - either for bug hunting or a penetration test project -, I always check 2…
1
55
215
@ozgur_bbh
Ozgur Alp
1 year
If you still cannot find your first RCE vulnerability on bug bounty programs, here is my blog post about of Simple Remote Code Execution Vulnerability Examples for Beginners from 3 years ago, which I found mostly at @SynackRedTeam programs. Link:
ozguralp.medium.com
Especially when I talk with newbie security researchers/bug bounty hunters, they always make me feel as not thinking theirselves capable…
4
74
300
@ozgur_bbh
Ozgur Alp
1 year
Please note that, as of 2024, %99 of BB programs do not accept this as a valid bug, but mark as low impact. I am still keeping this script updated because it is still useful on defensive side, to prevent unauthorized usage from other parties.
1
0
7
@ozgur_bbh
Ozgur Alp
1 year
Google Maps API Scanner is updated:.- Code is updated to reflect correct responses from Google API's, which are recently updated. - Deprecated API's are removed. - Python 2 support is removed. For more information:
Tweet media one
github.com
Contribute to ozguralp/gmapsapiscanner development by creating an account on GitHub.
2
9
96
@ozgur_bbh
Ozgur Alp
2 years
Before working on new blog post ideas at 2024, I wanted to share some of my best posts again from the previous years, in case anyone missed them. 1- A Less Known Attack Vector, Second Order IDOR Attacks.Blog post:
ozguralp.medium.com
Most of you probably familiar within the vulnerability types “IDOR (Insecure Object Direct Reference)” and second order vulnerabilities…
3
35
157
@ozgur_bbh
Ozgur Alp
2 years
Looks like Github SMS issue is finally solved. I can access my account after 3 months 😃.
0
0
5
@ozgur_bbh
Ozgur Alp
2 years
Turkcell kullanıp da Github 2FA aktif olan var mıdır acaba? Turkcell ile ne konuştuysak ne yaptıysak bir türlü halledemedik. Başkalarında da aynı problemin olup olmadığını anlayabilirsem süper olacak. 1 aydır hesaba hiçbir şekilde erişemiyorum, şaka gibi.
@ozgur_bbh
Ozgur Alp
2 years
It looks like @github removed Türkiye from SMS auth support list without any warning. But while trying to log in, it still asks for 2FA code as SMS which they do not send anymore. I mean, how can one login to their account if you stop sending SMS? :) .
6
0
11