Bug Bounty Tips & Tricks
Collection of Bug Bounty tips & tricks I have discovered and/or read on Twitter. Little bit of an overlap with web application testing but less vulnerability focused.
When crawling a target and observing the "node_modules" directory, make sure to verify each one of those modules being used has a public namespace associated with it (dependency confusion).
Leverage
xmlrpc.php
with thepingback.ping
command to discover a sites Origin IP address. Then supply it in theHost:
header to bypass an in place rate limit.Use one of the following extensions to open several URLs in your browser (ultimately adding them to your Interception Proxy), this can be better than using EyeWitness when there's redirect/CDN issues:
Configure Burp to display "hidden fields in forms" during proxying.
Create your own wordlists. Use SecLists as a starting point and leverage personal research + GAP to create personal and customized wordlists. This is your secret sauce during engagements.
/.well-known/apple-app-site-association
often times contains "weird" endpoints specified by a developer.Refer to the following tweet from Jason Haddix on exploring parameter fuzzing using ffuf: https://twitter.com/Jhaddix/status/1735337603027685605 (can also use these wordlists with param miner)
Great general bug bounty methodology on using OpenList, GAP, and Burp Suite: https://twitter.com/nullenc0de/status/1701318185352417648
Bug Bounty 'oneliner' for JSRecon: (https://twitter.com/nullenc0de/status/1680233695959998464)
Chain with the following to identify potential XSS vulnerabilities:
One liner for sorting per vulnerability with tomnomnom's
gf
tool:
One liner for automating testing for blind xss using dalfox, note, should be paired with the command above:
One liner for reconaissance,
hosts.txt
should be full of all subdomains identified, we will then ultimately grep out all URLs and paths for further fuzzing with ffuf after:
Proxy your tooling through BurpSuite for better results. For example, proxying GoSpider:
gospider -S live-urls -a -w -r --sitemap -c 20 -d 8 -p http://127.0.0.1:8080
One-liner to collect target domains from Project Discovery's public repo:
General automated XSS methodology:
Subdomain identification one-liner:
References
Last updated