
Ozgur Alp
@ozgur_bbh
Followers
7K
Following
954
Media
53
Statuses
816
RT @Dinosn: Interesting approach. The redirect seem to google calendar but it actually points to ' , where the lin….
0
6
0
RT @niksthehacker: An amazing time in live hacking event in #hongkong with @mcipekci @ozgur_bbh @Dinosn @turakbusra @A_Burak_Gokalp @ryanr….
0
3
0
RT @intigriti: 2️⃣ Authentication bypasses. @ozgur_bbh shares 5 ways to bypass authentication on your target!.
www.synack.com
Authentication bypass vulnerabilities are common flaws that exist in modern web applications—but they’re not always easy to find.
0
5
0
RT @AlicanKiraz0: Hi everyone! After a long period of work, I have completed the full analysis of the incident in Lebanon, as well as a det….
0
16
0
RT @InfoSecComm: Examine ways to get around multi-factor authentication, thanks to @ozgur_bbh for investigating response manipulation scena….
weekly.infosecwriteups.com
Welcome to the #IWWeekly107 - the Monday newsletter that brings the best in Infosec straight to your inbox. To help you out, we have 5 Articles, 4 Threads, 3 Videos, 2 Job Alerts and a Special Item...
0
1
0
RT @SynackRedTeam: Synack Red Team (SRT) member @ozgur_bbh dives into two two real-world MFA bypass techniques via response tampering that….
0
16
0
Check out my latest technical post published at @synack blog, titled as “Multi-factor Authentication Bypass Examples via Response Tampering”.
www.synack.com
Attackers are looking to compromise user accounts and are increasingly keen to find ways to bypass multi-factor authentication.
1
22
97
I started seeing BigQuery SQL database more often at the applications that I tested. While it has a similar technology to other DBMS'es, it still has a unique syntax for exploitation. Here is my blog post from 2 years ago in case you missed it.
link.medium.com
Last year, we (My researcher partner on this topic, Anil and me) and found a SQL injection vulnerability on a target at Synack which was…
2
31
104
Do you want to dive into the bug bounty platforms but still struggle how to start? Here is my non-technical advisory blog post from 2.5 years ago that I recommend all people who is interested to start bug hunting or newbie at the sector. Link:
link.medium.com
I got lots of questions and requests especially from new beginners to the area, so wanted to prepare a blog post regarding how to start at…
1
19
102
Do you have a blind error based SQL injection, which you cannot exploit further? If that's the case, here is my blog post titled "Turning Blind Error Based SQL Injection Into An Exploitable Boolean One" which covers an additional technique to exploit.
link.medium.com
While I was recently hunting on a promising host target, from my well configured (only checking SQLi) active scan results, I found out a…
1
60
171
If you are testing an application which is integrated within AWS document services and S3 buckets; here is my vulnerability write-up from 4 years ago which allowed me to view all sensitive files within bypassing the document signing mechanism.
link.medium.com
While I prefer more to write/talk about far-going topics instead of just one vulnerability write-up, I decided to make an exception for…
0
49
190
Do you want to find different type of vulnerabilities that automatic scanners mostly missing? Here is a blog post that I wrote 3 years ago about Load Balancer, Shallow Copy and Cache problems that causes data leakages, resulting even account takeovers.
link.medium.com
When looking for security vulnerabilities on a web application - either for bug hunting or a penetration test project -, I always check 2…
1
55
215
If you still cannot find your first RCE vulnerability on bug bounty programs, here is my blog post about of Simple Remote Code Execution Vulnerability Examples for Beginners from 3 years ago, which I found mostly at @SynackRedTeam programs. Link:
ozguralp.medium.com
Especially when I talk with newbie security researchers/bug bounty hunters, they always make me feel as not thinking theirselves capable…
4
74
300
Google Maps API Scanner is updated:.- Code is updated to reflect correct responses from Google API's, which are recently updated. - Deprecated API's are removed. - Python 2 support is removed. For more information:
github.com
Contribute to ozguralp/gmapsapiscanner development by creating an account on GitHub.
2
9
96
Security BSides Athens talk from 2020:
www.youtube.com
Abstract: Insecure direct object reference vulnerability type is a common known vulnerability on web application security researches. It is defined by OWASP ...
0
0
5
Before working on new blog post ideas at 2024, I wanted to share some of my best posts again from the previous years, in case anyone missed them. 1- A Less Known Attack Vector, Second Order IDOR Attacks.Blog post:
ozguralp.medium.com
Most of you probably familiar within the vulnerability types “IDOR (Insecure Object Direct Reference)” and second order vulnerabilities…
3
35
157
Turkcell kullanıp da Github 2FA aktif olan var mıdır acaba? Turkcell ile ne konuştuysak ne yaptıysak bir türlü halledemedik. Başkalarında da aynı problemin olup olmadığını anlayabilirsem süper olacak. 1 aydır hesaba hiçbir şekilde erişemiyorum, şaka gibi.
It looks like @github removed Türkiye from SMS auth support list without any warning. But while trying to log in, it still asks for 2FA code as SMS which they do not send anymore. I mean, how can one login to their account if you stop sending SMS? :) .
6
0
11