Day042

今日重点:

1.Bheem 侦察平台,聚合了很多的工具

https://github.com/harsh-bothra/Bheem

漏洞挖掘资源

1.bug-bounty-dorks

https://github.com/sushiwushi/bug-bounty-dorks

2.dirsearch

https://github.com/maurosoria/dirsearch

3.gin – a Git index file parser

https://github.com/sbp/gin

4.KingOfBugBountyTips

https://github.com/KingOfBugbounty/KingOfBugBountyTips

漏洞报告学习

1.The YouTube bug that allowed unlisted uploads to any channel

https://medium.com/bugbountywriteup/the-youtube-bug-that-allowed-uploads-to-any-channel-3b41c7b7902a

2.Subdomain Takeovers, beyond the basics for Pentesters and Bug Bounty Hunters

3.Account Takeover(ATO) and Email verification bypass in 2mins

https://medium.com/@karthiksoft007/account-takeover-ato-and-email-verification-bypass-in-2mins-5a6c8cb692a7

4.Server-Side Request Forgery using Javascript allows to exfill data from Google Metadata

https://hackerone.com/reports/530974

5.Bcrypt — Account TakeOver Due To Weak Encryption — #HR51KDB

https://medium.com/bugbountywriteup/bcrypt-account-takeover-due-to-weak-encryption-hr51kdb-4418f6e65907

Day041

今日重点:

1.侦查工具 3klCon

https://github.com/eslam3kl/3klCon

漏洞挖掘资源

1.Bug Hunting Tactics

https://speakerdeck.com/harshbothra/bug-hunting-tactics

2.Bounty Thursdays – Wordlists for content discovery and API bugs!

3.Beginner’s Guide to CTFs

https://medium.com/bugbountywriteup/beginners-guide-to-ctfs-c934a0d7f5f9

漏洞报告学习

1.My bug bounty journey. The middle-class boy who wanted everything for free.

https://vivekps143.medium.com/my-bug-bounty-journey-the-mind-of-a-middle-class-boy-who-wanted-everything-for-free-1456e160817c

Day040

重点:用Rust开发Fuzzing tools

Github: https://github.com/pxiaoer/rfuss2

文章:

1.Build simple fuzzer – part 1

https://carstein.github.io/2020/04/18/writing-simple-fuzzer-1.html

2.Build simple fuzzer – part 2

https://carstein.github.io/2020/04/25/writing-simple-fuzzer-2.html

3.Build simple fuzzer – part 3

https://carstein.github.io/2020/05/02/writing-simple-fuzzer-3.html

4.Build simple fuzzer – part 4

https://carstein.github.io/2020/05/21/writing-simple-fuzzer-4.html

Day039

今日重点:

1.Zero-day in Sign in with Apple

https://bhavukjain.com/blog/2020/05/30/zeroday-signin-with-apple/

漏洞挖掘资源

1.SAML Testing

2.SSTI to Local File Read

https://www.r29k.com/articles/bb/ssti

3.crtfinder v2

https://github.com/eslam3kl/crtfinder

4.Exploiting dynamic rendering engines to take control of web apps

https://r2c.dev/blog/2020/exploiting-dynamic-rendering-engines-to-take-control-of-web-apps/

5.Bug-Bounty-Toolz

https://github.com/m4ll0k/Bug-Bounty-Toolz

6.Reconizer

https://github.com/Sicks3c/Reconizer

7.Bug-Bounty-Roadmaps

https://github.com/1ndianl33t/Bug-Bounty-Roadmaps

漏洞报告学习

1.Chaining vulnerabilities lead to account takeover

https://ahzsec.medium.com/chaining-vulnerabilities-lead-to-account-takeover-b583f0c10591

2.Unauthenticated Account Takeover Through HTTP Leak

https://medium.com/bugbountywriteup/unauthenticated-account-takeover-through-http-leak-33386bb0ba0b

3.Spear Phishing in Google Cloud

https://medium.com/@filipz0203/spear-phishing-in-google-cloud-a80fb42577fe