RootMoksha Labs (@rootmoksha) 's Twitter Profile
RootMoksha Labs

@rootmoksha

Cybersecurity focussed Bitcoin venture studio

ID: 1721857998941761536

linkhttps://rootmoksha.com/ calendar_today07-11-2023 11:51:59

985 Tweet

6,6K Followers

1 Following

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Keeping debug mode enabled can expose sensitive info in the web app's stack trace like database credentials, file paths, and more. List of few common errors that can be searched through Google Dorking using error title by N$ #bugbounty #bugbountytips

Keeping debug mode enabled can expose sensitive info in the web app's stack trace like database credentials, file paths, and more.  

List of few common errors that can be searched through Google Dorking using error title by <a href="/nav1n0x/">N$</a> 

#bugbounty #bugbountytips
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

๐——๐—ผ๐—ฟ๐—ธ ๐˜๐—ผ ๐—ณ๐—ถ๐—ป๐—ฑ ๐—ป๐—ฒ๐˜„ ๐—ฅ๐—ผ๐—ผ๐˜ ๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป๐˜€ ๐——๐—ผ๐—ฟ๐—ธ: ยฉ [COMPANY_NAME]. All rights reserved. Credits: Cybertix #BugBounty #bugbountytips

๐——๐—ผ๐—ฟ๐—ธ ๐˜๐—ผ ๐—ณ๐—ถ๐—ป๐—ฑ ๐—ป๐—ฒ๐˜„ ๐—ฅ๐—ผ๐—ผ๐˜ ๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป๐˜€

๐——๐—ผ๐—ฟ๐—ธ:  ยฉ [COMPANY_NAME]. All rights reserved.

Credits: <a href="/thecybertix/">Cybertix</a> 

#BugBounty #bugbountytips
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

The target is a WordPress with a plugin that vulnerable to SQLi, but got blocked by a reverse proxy WAF. Using WordPress PingBack for blind SSRF to reveal its IP behind the WAF could exploit the SQLi successfully! Credit: chux #bugbounty #bugbountytips

The target is a WordPress with a plugin that vulnerable to SQLi, but got blocked by a reverse proxy WAF.
Using WordPress PingBack for blind SSRF to reveal its IP behind the WAF  could exploit the SQLi successfully!

Credit: <a href="/chux13786509/">chux</a>

#bugbounty  #bugbountytips
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Finding of this day IDOR in cookie, when I change ID it's take me directly to another user account Browser Extension for cookie: chromewebstore.google.com/detail/cookie-โ€ฆ By:๐Ÿ‡ธ๐Ÿ‡ฆ ROOD | GOAT #bugbountytips #bugbounty

Finding of this day

IDOR in cookie, when I change ID it's take me directly to another user account

Browser Extension for cookie: chromewebstore.google.com/detail/cookie-โ€ฆ

By:<a href="/0x_rood/">๐Ÿ‡ธ๐Ÿ‡ฆ ROOD | GOAT</a>

#bugbountytips #bugbounty
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server github.com/harisec/orangeโ€ฆ Credit: harisec #bugbountytips #BugBounty

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

CRLF vulnerabilities but is a firewall standing in your way? don't forget that sometimes some odd encodings may allow you to bypass firewalls! Credit:Md Ismail ล ojal๎จ€ #bugbountytips #bugbounty

CRLF vulnerabilities but is a firewall standing in 
your way? don't forget that sometimes some odd 
encodings may allow you to bypass firewalls! 

Credit:<a href="/0x0SojalSec/">Md Ismail ล ojal๎จ€</a> 

#bugbountytips #bugbounty
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Account Takeover via Password Reset poisoning... If changing the Host header or X-Forwarded header doesn't worked, try to add another Host header with the -:space:- Credit - Danial Halo #bugbounty #bugbountytips

Account Takeover via Password Reset poisoning... 

If changing the Host header or X-Forwarded header doesn't worked, try to add another Host header with the -:space:-

Credit - <a href="/DanialHalo/">Danial Halo</a> 

#bugbounty #bugbountytips