P3 Bug in Few Minutes

1 month ago 49
BOOK THIS SPACE FOR AD
ARTICLE AD

Overlooked Test Cases

AbhirupKonwar

🚨 Free Article Link: Click here👈

whoami ❓

I am Abhirup Konwar (aka LegionHunter). I work as a full-time bug hunter and dedicate the rest of the time in understanding inner workings of open-source malwares.🥷

I have reported over 1000 bugs on OpenBugBounty as well as on HackerOne and BugCrowd along with numerous Hall Of Fame programs including NASA, American Systems (🥇Top 5 Bug Hunter) and self hosted VDP + BBP , with bugs belonging to both Client and Server Injection category, Sensitive Information Disclosure & Broken Access Control.

Let’s start with P3 Hacking now guys!

Credit: DALL-E 3

It’s a public VDP program on BugCrowd and many wildscope domains were in-scope. I started hunting for exposed files using google dorking, but this time without the usual sensitive keywords “CONFIDENTIAL”, “PRIVATE”,”SENSITIVE”, etc…

What happens is that if the document contains photos or images , it cannot be matched by those dorks, manual crawling is needed which majority of the hunters don’t like to do so.

site:domain.com inurl:view inurl:private ext:pdf
site:domain.com inurl:upload ext:pdf
site:domain.com inurl:uploads ext:pdf
site:domain.com inurl:internal ext:pdf
site:domain.com inurl:storage ext:pdf
site:domain.com…
Read Entire Article