Published inTechiepedia·PinnedMember-only5 Ways to Test Password Reset FunctionPassword reset is a function commonly founded in modern web app. This function normally would be the first function I tested in every web app as once a bug is founded, it is normally a critical one. In this article, I would show several ways to test this function. Before…Infosec4 min readInfosec4 min read
Published inTechiepedia·Mar 6, 2022Member-onlyResponse Manipulation leads to Account TakeoverThis is a short story about my recent bug hunting on a private program. This program mainly relies on OTP to check user’s authentication. This story would walk through how I bypass its OTP check using response manipulation. So, let’s begin. If you are not yet a medium member, please…Cybersecurity3 min readCybersecurity3 min read
Feb 23, 2022Member-onlyWhat You can Learn from Coinbase Hack with USD250k BountyAs a bug bounty hunter, you may experience something like below: After hundreds hours of hacking, you found zero bugs. So, you work a lot harder, doing more recon and test on every single endpoint. However, as time goes by, still no more bugs could be found. Finally, you found…Hacking5 min readHacking5 min read
Published inJavaScript in Plain English·Feb 14, 2022Member-onlyJavaScript Security — Weak Type BypassHow hackers can bypass JavaScript security checks exploiting its weakly typed feature. — As you may know, JavaScript is a weakly typed language. These features of the language can be used by hackers to bypass some checks within a Node.js application. So, what is it means by weak type? Let’s consider the below example: var a =1; var b ="1"; var c= a + b; console.log(c==="11")…JavaScript3 min readJavaScript3 min read
Published inSystem Weakness·Dec 27, 2021Member-onlyCommon Nginx Misconfiguration leads to Path TraversalRecently, I have been invited by my friend to participate into a private pentest project. The target has been using Nginx as its Reverse Proxy and I found a common Nginx misconfiguration that leads to a path traversal bug. In order to help the owner of the target to have…Nginx3 min readNginx3 min read
Nov 23, 2021Member-onlyCommon Bugs found in File Upload FunctionsFile upload is a function commonly founded in web app. You may find it in social network app, job seeking app etc. Also, it is one of the areas that developers would overlook. This article mainly introduces what common bugs can be founded in file upload functions. So, let’s begin: File Upload IDOR …Cybersecurity3 min readCybersecurity3 min read
Nov 20, 2021Member-onlyLinux Tricks for Bug Bounty HunterIn previous post, we discussed about how to setup a Recon Machine on VPS and how to use Screen to maintain your recon process even after you logout from VPS. This article would walk you through some other linux tricks Bug Bounty Hunter normally used in their hacking. Schedule Your Task In Linux…Cybersecurity3 min readCybersecurity3 min read
Oct 31, 2021Member-onlySetup Your Own Recon Machine on Digital OceanIf you are a bug bounty hunter, you may notice that recon is very time consuming. Sometimes, even you have mostly automate your recon, recon might takes days or even weeks if you are hunting on a huge scope. If you use your home workstation, it occupies quite a lot…Hacking4 min readHacking4 min read
Oct 14, 2021Member-onlyAutomate Your Hunting — Cache PoisonCache Poison is a bug commonly seen in web apps. This passage walks you through how you could automate your testing on such commonly seen bug in web application. …Bug Bounty Tips2 min readBug Bounty Tips2 min read
Oct 9, 2021Member-onlyPower of Your Own Wordlist — Fuzz for Log File Leads to Information LeakageThis is another story of my recent finding of sensitive information leakage. The target is a big hotel and resort Group which has operation in over 10 countries over the world. As I am not allowed to disclose the detail, I would use redacted.com …Cybersecurity3 min readCybersecurity3 min read