xalgord Profile Banner
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš• Profile
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•

@xalgord

Followers
331
Following
107
Media
94
Statuses
314

Penetration tester | eJPTv2 | Bug Bounty Hunter

India
Joined January 2020
Don't wanna be here? Send us removal request.
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 months
Checkout "How to Rotate Your IP Address & Stay Anonymous System-Wide on Windows (2025 Guide)" #BugBounty #cybersecurity #Hacking.
0
0
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
3 months
An SQL dump file (mysql.sql) was exposed at "http:// SUB.REDACTED .net/ wp-content/mysql.sql", revealing sensitive information like user credentials and API keys. Tip: Create a custom wordlist instead of using common ones. #bugbounty #CyberSecurity #hacking
Tweet media one
0
0
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
3 months
Made a POC for How I was able to access AWS metadata service from outside the EC2 Instance. #bugbounty #CyberSecurity.
0
0
1
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
9 months
I just published Comprehensive Bug Bounty Hunting Methodology (2024 Edition) . #bugbountytip #bugbounty #Hacking #CyberSecurity.
0
0
2
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
1 year
RT @nav1n0x: Advanced SQL Injection Techniques now available in GitBook. Make a copy/ Archive / Convert to PDF before they report this too….
0
200
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
RT @win3zz:
Tweet media one
0
283
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
RT @therceman: Bug Bounty Tip. List of localhost addresses for SSRF bypass. πŸ”Ή http://localhost.πŸ”Ήhttp://127.1.πŸ”Ήhttp://127.0.0.0.πŸ”Ήhttp://127.0….
0
217
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
0
0
2
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
Found a stored XSS in 15 minutes. Payload used: "></div><a/href="j&Tab;a&Tab;v&Tab;asc&Tab;ri&Tab;pt:alert&lpar;document.cookie&rpar;">. #bugbounty #cybersecurity #penetrationtesting
Tweet media one
0
1
3
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
XSS via Comment Bypass. The reflected payload was commented out in the source code like this: <!-- <h1>test</h1> -->. So, I used this payload to uncomment the code: --><h1>test</h1>. Now the source code becomes this: <!----><h1>test</h1> and it works. #bugbounty #xss #Pentesting
Tweet media one
0
0
2
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
payload used: %27%22%3E%3CScRipt+class%3DXalgord%3Ealert.bind%28%29%281%29%3C%2Fscript%3E.
0
0
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
Found an XSS in a VDP using paramspider, gau, waybackurls, and kxss #XSS #BugBounty
Tweet media one
2
0
1
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
- Check for tokens are set to httponly or not.- Try adding or changing application request headers.- Anything you can modify or change should be tested.
0
0
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
- test login functionality, try some SQL injections or run sqlmap, try changing user privileges.- try to strip off authorization headers from the request.- test every input field for injection attacks with different payloads, try to bypass filters.
1
0
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
3. Exploitation:. - first look for the discoveries that you found outside the technology used by the application.- try to bypass filters, try using null-bytes etc., or try encoding urls using encodeURIComponent in javascript, try encoding encoded url again to bypass filter.
1
0
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
- take screenshots of everything you'll see potentially vulnerable.- look for JS files in the developer console and use some patterns to find things like potential URLs, like searching for keywords that you have seen on the webpage.
1
0
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
2. Manual Enumeration:. - first look for files like robots.txt and security.txt.- test everything with the console opened.- while hovering over links, carefully look at the bottom left of the page to see the link address.
1
0
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
1. Automatic Enumeration:. - use wappalyzer to detect technology used by the web application.- first run ffuf or feroxbuster for discovery.- run crawler and Ajax crawl with and without authentication.
1
0
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
3 Basic Steps of Bug Bounty Methodology πŸ§΅πŸ‘‡ #bugbounty #hackerone.
1
0
0
@xalgord
π™Ίπš›πš’πšœπš‘πš—πšŠ π™ΊπšŠπšžπšœπš‘πšŠπš•
2 years
Thanks dude.
@SavvasStephnds
Savvas Stephanides
2 years
πŸ”₯ Website of the day: XALGORD. 🀩 I like how blog posts are neatly organised by category and tags. πŸ› οΈ I think the bottom navigation is great for mobile but doesn't work very well on desktops. What do YOU think of @xalgord's site? πŸ”₯
Tweet media one
1
0
1