Huobi Research(@Huobi_Research) 's Twitter Profileg
Huobi Research

@Huobi_Research

Blockchain industry top think tank

ID:1721217523679625216

calendar_today05-11-2023 17:27:03

1 Tweets

13 Followers

7 Following

Jayesh Madnani(@Jayesh25_) 's Twitter Profile Photo

๐Ÿ”๐Ÿ’ฐ Question of the day: How can you maximize payouts for 'Low' risk open redirect issues? ๐Ÿค‘ I've personally earned over $30,000 in bounties by chaining open redirect submissions to ATOs. These 'Low' severity bugs can often be escalated through a double redirection, resultingโ€ฆ

account_circle
Michael Blake(@Michael1026H1) 's Twitter Profile Photo

If you want to be good at finding XSS, you need to understand how HTML/javascript work. Copying/pasting a payload everywhere works for some cases, but you'd be missing a lot of cases. What's filtered, your context, and what's possible with this combination are extremely important

account_circle
c0mr3x(@c0mr3x) 's Twitter Profile Photo

Found XSS in private bug-bounty ..
document was filtered, so as () ..
my final payload -> javascript:setTimeout`\x64ocument.write\x28\x64ocument.\x63ookie\x29`

account_circle
0 day exploit(@0day_exploit_) 's Twitter Profile Photo

Thread ๐Ÿงต:๐Ÿ‘‡ Found Open-redirect >> xss >> ato
1) Try normal XSS payload -
javascript:alert(1)
javascript:%61lert(1)
javascript:&#37&#54&#49lert(1)
javascript:%26%2337%26%2354%26%2349lert(1)

account_circle
Ahsan Khan(@hunter0x7) 's Twitter Profile Photo

Update no 3: Reported 15 submissions (total).

Critical one:

Used Js Miner & twitter.com/h4x0r_dz/statuโ€ฆ for finding sen* info in JS files.

Found a JS file disclosing access token without any endpoint.

(1/3)

account_circle
Shubham Tiwari(@shubhamtiwari_r) 's Twitter Profile Photo

Excited to share my Bug Bounty Script It automates security tests & reconnaissance for target domains including, web server scanning, subdomain enumeration XSS vulnerability scanning, and more!๐Ÿž๐Ÿ” Check it out GitHub: [github.com/shubham-rooterโ€ฆ]

account_circle