BOOK THIS SPACE FOR AD
ARTICLE ADIt was a private program which I found public. So I was doing directory brute forcing using dirsearch.
dirsearch-u https://target.com -i 200,300–399,401,403,500 -r
-r to do recursive scan-i to specify the status codes we want in output-u to specify the target urlI got a 200 status code on .htaccess & web.config files. Also I manually verified it was publicly exposed. I reported it under sensitive files exposure and I got this reply…
#BugBountyIndia #IndianHackers #CyberSecurityIndia #BugBountyHunter #HackerOneIndia #InfoSecIndia #SSRFVulnerability #AppSecIndia #EthicalHackingIndia #WebSecurityIndia #SecurityResearcher #CyberSecCommunityIndia #BugBountyTips #PentestingIndia #RedTeamIndia #HackersOfIndia #ResponsibleDisclosure #IndianSecurityCommunity #TechSecurityIndia #CyberSecurityAwareness #HackingTips #VulnerabilityHunting #BugBountyLifeIndia #HackThePlanetIndia #WebAppSec #IndianBugHunters #SecurityTestingIndia #OffensiveSecurityIndia #CTFIndia #CyberAwarenessIndia #InfoSec #EthicalHacking #CyberSecurity #WebSecurity #AppSec #BugBountyTips #WebAppSec #RedTeam #PenTesting #HackerLife