Bringing an important tip back! 👇
When you encounter a 403 Forbidden page 🚫 , try adding an "X-Client-IP" header with the value "127.0.0.1"
#BugBountyTips
🎉 100k Giveaway 🎉
Hackers walked so Bugcrowd could run. Thank you for being part of our community! 🏃 💯
To show our appreciation, we're giving away swag all day! 😎
To enter 🎟️ ⤵️
🔁 RETWEET
🧡 LIKE
✅ Drop your fave Bugcrowd memory below👇
#ItTakesACrowd
⏰ Time for a
#GIVEAWAY
!
💬 We want to hear from you.
How to win swag?
📣 Retweet
📣 Like
📣 Complete the survey
📣 Drop an emoji once completed
Click here to get started: ⤵
Found a Wordpress site? The easiest place to find bugs is in the plugins.
1. Find the installed plugins with WPScan
2. Set up your own WP instance and install the same plugins
3. Hack your own instance
4. Report your bugs!
The most common bug you'll find with this method is XSS
🎁 Merry X(SS)MAS! Hackers!🎄
Beginning today we are doing 12 swag-ful days of giveaways and challenges.
Today's challenge is simple: spread the cheer of
#XSSMAS
with a retweet of this tweet to be one of 12 researchers to get today's exclusive swag! ☃️
What's your favorite part of this hacker setup? 💻👇
We would share ours, but we can't choose just one. 👀
It's. Too. Cool. 😈 😎
Thanks for sharing!!
@aditi_singghh
If you're hunting for low-hanging bugs in source code, grep and regex can help you to identify hotspots. For example, you might find basic rXSS in PHP with something like this:
grep -r "echo.*\$_\(GET\|REQUEST\|POST\)" .
3 ways to use Nmap as a vulnerabiltiy scanner
🐛 nmap -sV --script vuln <target>
🪲 nmap -sV --script vulners.nse <target>
🐞 nmap -sV --script vulscan/vulscan.nse <target>
Details on using vulscan in thread 🧵👇
Did someone say Week of Giveaways?
Oh! That's right, we did. 😏
🎟️ To enter day 1:
⏺️ Follow us
@Bugcrowd
❤️ Like this post
💬 Reply with a GIF that best represents your reaction when you find a critical bug
GIVEAWAY 🎁🎁
It's simple, here are the rules:
🧑💻 Be a hacker
🔁 Retweet
❤️ Like
📝 Fill out the survey
👇 Drop an emoji when done
You could win an entire swag bundle just by filling out the survey 😱
.
@InsiderPHD
's top bug bounty hunting tools of 2023 🚀
🔨 Burp Suite
🔧 Kiterunner
🪛 Shodan
🪚 Amass
🗜️ FFUF
⛏️ SQLMap
🪓 Frida
🔩 TruffleHog
🛠️ XSS Hunter Express
⚒️ Nuclei
🧰 Interactsh
What would you add or remove from this list in 2024?
Have you been lookin for a crash course on XXE bugs? It's a class of bugs often missed by even the most seasoned hackers. 🤓
Here is everything you need to know to start finding XXE bugs. Godspeed! Happy hacking!
Did you know: The term 'bug' (as it refers to computers) was first coined in 1947 when a group of computer scientists found an actual moth causing malfunctions in a computer.
Looking to quickly dump URLs from a webpage using curl and some regex magic!? Try:
curl -s
https://www.bugcrowd[.]com
| pcregrep -o "(http:\/\/|https:\/\/).*?(?=\"|'| )" | sort -u
"For me, the ninth month of the Islamic calendar, Ramadan, is the month to think about the blessings Allah has casted on me and my family, reflect on the year and act towards becoming a better Muslim."
- Murtaza Haizji (Senior Manager Demand Gen)
Ramadan Mubarak 🙏
How to enumerate subdomains using Ffuf and SecLists!
Just like you would fuzz directories but you put "FUZZ" at the start of the URL instead of at the end.
⌨️ ffuf -u FUZZ.<target> -w <wordlist>
New to bounties?
We've created this page containing links to everything you need to know including free educational resources, researcher docs, how to find bugs, beginner resources, how to get private invites, and more. Login to view!
#BugcrowdTipJar
If you ever find a SSRF on a Windows box, try running on your own VPS, then send the SSRF to file://<yourvps>. With a bit of luck, the server will send you some tasty Windows NetNTLMv2 hashes to crack!
What are other methods do you use?
#BugcrowdTipJar
XSS is the most common bug class! It pays to be good at finding them. In the latest how-to blog post,
@hakluke
covers what XSS is, different discovery methods, contexts, filter bypasses, weaponized payloads, and more.
While he hits some pretty big bounties, you might be surprised how
@hunter0x7
got started in bug hunting.
Join us for this researcher spotlight and down to earth chat with Ahsan Khan!
#ItTakesACrowd
A meme a day keeps the blues away.
🔁 Retweet for meme 1
💙 Like for meme 2
⚠️ We will choose one random participant to win SWAG!
#BugBountyMemes
by
👉
@thecryptohack3r
When you find an XSS, at minimum, use alert(document.domain) over alert(1). This helps to demonstrate the context that the JavaScript is executing in. Even better, escalate the XSS to perform an account takeover!
Don't forget to share your own XSS tips using
#BugBountyTipJar
Do you have a New Year's resolution to start bug bounty hunting?
Get a head start with
@nahamsec
's HUGE list of resources for beginners:
🐞 Basics
🐛 Blogs & Talks
🐜 Books
🦟 Setup
🪲 Tools
🪳 Labs
🕷️ Talks
🐜 Coding
🦟 Mindset
And more! 👇
Today seems like a good day to watch YouTube 🥱
Tell us your favorite
#hacker
content creator and be entered to win a Pentesterlab Subscription!👇
Week of
#giveaways
day 2 🎁
Knowing regex is a very powerful skill for hackers. It allows us to be more productive, and also gives us an insight into how we might exploit Regex-based security controls.
Read this blog by
@hakluke
to learn more!
eLFI's back and on the hunt searching for your coolest hacker swag! 🎁
From keyboards to hoodies, what's been your favorite piece of
#Bugcrowd
swag over the years? 📸
To enter:
👉 Retweet + Like
👉 Reply with a pic of your swag
#giveaway
#eLFI
We're dropping some
#BugBountyTips
👉 Chain AutoRepeater and Taborator to Automate SSRF Findings.
Created by:
@bsysop
👏
Check the thread below for more details ⤵️
Looking at getting into bug bounty hunting?
Bugcrowd University is a ✨FREE✨ project to help you level-up your skills!
Modules include:
✅ Making a Good Submission
✅ Burp Suite
✅ XSS
✅ Recon and Discovery
✅ SSRF
✅ XXE
And more!
Jump in 👇
Want to WIN SWAG?🏆
Play the game!🎮
🔒Guess the password (26 letters)
🔢Numbers correspond to letters
✍️Example: 1 = A, 2 = B, 3 = C
🔑We'll drop a hint for every 100 likes
👇Comment your guess below, no letters allowed
Hint:
#StarWars
#MayTheForceBeWithYou
#WorldPasswordDay
A quick one-liner that will gather + crawl all subdomains, then convert to a custom wordlist unique to that organisation based on discovered URLs!
subfinder -d bugcrowd[.]com -silent | httpx -silent | hakrawler -plain | tr "[:punct:]" "\n" | sort -u
🚨CHALLENGE TIME🚨
Can you popup an alert?😉
Rules⤵️
📣DM us a screenshot once complete
📣100 likes & we'll release a hint
15 winners⤵️
🥇5 winners: hoodies
🥈5 winners: t-shirts
🥉5 winners: stickers + glasses
GO 👉
Challenge by
@MRCodedBrain