今日重点:
1.How I Found The Facebook Messenger Leaking Access Token Of Million Users
漏洞挖掘资源
1.The Pen Testing Tools We’re Thankful for in 2020
2.Hacking SSO: SAML Signature Misconfigurations
3.What it takes to find bugs in bounties!
https://medium.com/bugbountywriteup/what-it-takes-to-find-bugs-in-bounties-273ad278f77e
4.A Drop of Jupyter: A Modular Approach to Penetration Testing
5.Using Burp to Test for Open Redirections
https://portswigger.net/support/using-burp-to-test-for-open-redirections
漏洞报告学习
1.

https://twitter.com/GodfatherOrwa/status/1330440633249619977
2.Open Redirect Protection Bypass
https://hackerone.com/reports/283460
3.#BugBounty @ Linkedln-How I was able to bypass Open Redirection Protection
4.Story of bypassing Referer Header to make open redirect
https://medium.com/@malcolmx0x/story-of-bypassing-referer-header-to-make-open-redirect-94f938b9d032
5.Bug Bytes #19 – The Real Impact of Open Redirect, Advanced CORS Exploitation Techniques & Common API Pitfalls
6.From Sub domain Takeover to Open-Redirect
7.Account takeover through password reset
https://medium.com/@seaman00o/account-takeover-through-password-reset-82adc0c19248
8.iOS Facebook Messenger Leaking Users Access Token POC 2020