XSS  POC || Kia.com  || NO RESPONSE
4:18
OTP Bypass  | livspace.com
1:18
2 ай бұрын
BUG || Blind xss POC ||Kia
4:34
5 ай бұрын
BUG BOUNTY | POC||Ever green
4:42
Bug Bounty | POC| SQL INJECTION
2:58
BUG REPORT  | andhrabharathi XSS
1:30
Пікірлер
@raghs3889
@raghs3889 4 күн бұрын
you used same JWT token for creating all user accounts? if so, JWT token is not getting validated isn't it?
@A9x-AkhilReddy
@A9x-AkhilReddy 3 күн бұрын
@@raghs3889yes it is also a issue that you explained. see below comments that I given the explanation. I will explain a little bit . The jwt is easily guessable it is encoding with email last like gonator.com then it holds the user id . User id is assigned in ascending order.
@mohithreddy1439
@mohithreddy1439 11 күн бұрын
Hi bro telugu na meeru great work bro meeru reply isthey personal ga ping chestha
@user-th3ym9nt2p
@user-th3ym9nt2p 20 күн бұрын
i need payload bro
@A9x-AkhilReddy
@A9x-AkhilReddy 20 күн бұрын
@@user-th3ym9nt2p drop you social media handle .I will send to you
@user-mo8uj9vq5u
@user-mo8uj9vq5u 21 күн бұрын
yes indeed that math is being evaluated and I can tell this is a legit ssti how that turn out for you and are you open to collab?
@A9x-AkhilReddy
@A9x-AkhilReddy 21 күн бұрын
@@user-mo8uj9vq5u thanks for the Collab request. I escalate into RCE for jinja2 instances I cut the part and just uploaded. If I got anything I will Collab . Try to drop the social media link to contact you . Any way they scammed me for not getting any response from their side.
@user-mo8uj9vq5u
@user-mo8uj9vq5u 21 күн бұрын
@@A9x-AkhilReddy u have twitter ill add u
@BMV-kl1br
@BMV-kl1br 23 күн бұрын
bro can i get ur telegram
@BMV-kl1br
@BMV-kl1br 23 күн бұрын
or ur insta id ???
@A9x-AkhilReddy
@A9x-AkhilReddy 23 күн бұрын
@@BMV-kl1br why bro ask here bro .I will give a solution if I have it.
@akroidofficial
@akroidofficial 24 күн бұрын
why you gave title bug bounty scam?
@zedvn3792
@zedvn3792 24 күн бұрын
Why do you know where to add the character "?"(cloud/?) come in and include the payload?
@A9x-AkhilReddy
@A9x-AkhilReddy 24 күн бұрын
@@zedvn3792 it just a part of testing bro .even If I don't the target at first . I just randomly check everything . The most important thing is if you open any domain in your browser go through the entire source code .you can get some most interesting url ,URI , endpoints , parameters, in that source code. That time I saw this I just added the "> but nothing happened . But it reflects the exact same value inside it . Then I add these symbols for further testing how things are really working . Then I just add ;, ?so it happened .Then it comes out of the tag .then I inject simple html payloads it worked .while I was testing for xss .the waf blocked me .so I have some payloads list that saves from all over the internet .I sent it to the intruder .and checked the response of 218 payloads .then I got the xss . I hope I clarify it for you .
@zedvn3792
@zedvn3792 18 күн бұрын
@@A9x-AkhilReddy nice bro
@zedvn3792
@zedvn3792 24 күн бұрын
I have seen the jwt token so how would you describe it with impact to get recognition?
@A9x-AkhilReddy
@A9x-AkhilReddy 24 күн бұрын
​@@zedvn3792 unfortunately it is duped .but any way I explain the scenario . Basically the jwt contains the the user id and the last name of email gonetator.com . It is assigned successfully . I was testing on three different emails to create an account. But in those responses it is the same as what I told you about above . So the server assigned a jwt so it is predictable . So that was the flaw in creating multiple accounts . Without correct OTP .
@jineshchudasama
@jineshchudasama 24 күн бұрын
Did you receive any responses? I also found a RCE, but still, they fixed the bug and didn't reply.
@naho534
@naho534 26 күн бұрын
what tool did u use?
@A9x-AkhilReddy
@A9x-AkhilReddy 26 күн бұрын
@@naho534 I didn't understand your point
@naho534
@naho534 25 күн бұрын
@@A9x-AkhilReddy what tool did you use to find the xss vulnb
@sukremez1870
@sukremez1870 26 күн бұрын
how did you find it that the url can do &service?
@A9x-AkhilReddy
@A9x-AkhilReddy 26 күн бұрын
@@sukremez1870 I got you back . If you test any application you just gather info about the technology they used . Then you are testing like hit and trail . Everything about the website you have to test for different aspects in a different manner .if you don't know where you want to test.you just read the documentation of the website you are testing . It would help you what endpoint and what was the details fetch from backend to front end simple how it is working . And that was the phase where I discovered the first name and second name is vulnerable to SSTI.then I check what was they used template to process the data .then I got to know it was Jinja2 instances template is used . Then I tried a simple payload. And it worked . Then I dig deep to escalate into RCE. I hope I just clear your question
@sukremez1870
@sukremez1870 25 күн бұрын
@@A9x-AkhilReddy aight got it
@NethaxStark
@NethaxStark 26 күн бұрын
Now these payloads are not working!
@NethaxStark
@NethaxStark 26 күн бұрын
Could you give me the payload lists!
@A9x-AkhilReddy
@A9x-AkhilReddy 26 күн бұрын
@@NethaxStark search it on Twitter or Google it .
@NethaxStark
@NethaxStark 26 күн бұрын
@@A9x-AkhilReddy Your list !
@A9x-AkhilReddy
@A9x-AkhilReddy 26 күн бұрын
@@NethaxStark how did I sent it to you bro .provide your discord link . I would send you my list
@bountyvitcim
@bountyvitcim 27 күн бұрын
reward?
@A9x-AkhilReddy
@A9x-AkhilReddy 27 күн бұрын
@@bountyvitcim it is not a bug bounty program. I randomly got this domain in a YT ad . So I was looking for a website .I just add </script> tag in URI .so it get out of it . Then I mailed him and I found a bug In your systems . Then they responded within a week .then the guy who replied to the mail he gave a mail of their security team . Then I reported . After a month of waiting they are telling us we are not given any reward at least I asked a swag .nothing bro .I found a 36 xss and 4XML injection , 2 sqli and 2 authentication bypass ATO and business logic bugs we can use premium features for free . in that domain and subdomain.
@bertinjose
@bertinjose 27 күн бұрын
how can i get bxsshunter?
@aatankbadboy3941
@aatankbadboy3941 Ай бұрын
Bro bounty??
@A9x-AkhilReddy
@A9x-AkhilReddy Ай бұрын
@@aatankbadboy3941 no bounty .scammed me . I found a sql injection also in that website . But I dumped the entire data and upload a shell and remove important files . This is a long scary story . They rebuilt everything from scratch.
@A9x-AkhilReddy
@A9x-AkhilReddy Ай бұрын
@@aatankbadboy3941 by the way it is a open bug bounty program back in 9 months ago
@aatankbadboy3941
@aatankbadboy3941 Ай бұрын
Bro keep uploading but only by which you are earning 😂
@avinfajar7278
@avinfajar7278 28 күн бұрын
Wew
@aatankbadboy3941
@aatankbadboy3941 Ай бұрын
Bro love you keep uploading
@Erontos01
@Erontos01 Ай бұрын
I want you to teach me😊
@A9x-AkhilReddy
@A9x-AkhilReddy Ай бұрын
@@Erontos01 still a noob to explore new things
@Couple-Rounds
@Couple-Rounds Ай бұрын
how much bounty? You do it like lostsec-coffin😊
@A9x-AkhilReddy
@A9x-AkhilReddy Ай бұрын
@@Couple-Rounds I know him bro .twitter hot topic on infosec . I don't disclose bounty amount bro.
@archuser532
@archuser532 Ай бұрын
@@A9x-AkhilReddy why not please share the bounty amount as i am also beginner to this
@somean3083
@somean3083 Ай бұрын
hey i am a recent subcriber, i recently got introduced to the world of ethical hacking and bug bountys. i am learning data structures and algorithims right now, and i really wanna get into the hacking and cybersecruity world. i would love to connect with you learn from you.
@CountDraculYeaminthescorpio
@CountDraculYeaminthescorpio Ай бұрын
nice
@zinksec
@zinksec Ай бұрын
fly brother🤙
@avinfajar7278
@avinfajar7278 Ай бұрын
You didn't get the bounty bro?
@A9x-AkhilReddy
@A9x-AkhilReddy Ай бұрын
@@avinfajar7278 no I didn't get any reward
@gk_eth
@gk_eth Ай бұрын
did you submitted the impact?
@A9x-AkhilReddy
@A9x-AkhilReddy Ай бұрын
@@gk_eth I show a simple payload in this poc . I cut the interesting part I escalate into RCE
@sukremez1870
@sukremez1870 26 күн бұрын
@@A9x-AkhilReddy if rce, got bounty then? if yes, does this website have bounty program in hackerone/bugcrowd? or no?
@helloworld-jz2bk
@helloworld-jz2bk Ай бұрын
can you share some of your payloads ?
@kiirapookii
@kiirapookii Ай бұрын
what scammed you?
@A9x-AkhilReddy
@A9x-AkhilReddy Ай бұрын
@@kiirapookii they patch the vulnerability and doesn't give any reward
@kiirapookii
@kiirapookii Ай бұрын
@@A9x-AkhilReddy very sad ...keep hunting on good programs
@ModiBilgaiyan-fc5ex
@ModiBilgaiyan-fc5ex 2 ай бұрын
Mere laptop me setup kara doge ?? I will pay you money
@A9x-AkhilReddy
@A9x-AkhilReddy 2 ай бұрын
Kya setup bhaii ?? Is it Burp suite are anything else
@ModiBilgaiyan-fc5ex
@ModiBilgaiyan-fc5ex 2 ай бұрын
@@A9x-AkhilReddy otp bypass karna hai mujhe gaming app ka
@A9x-AkhilReddy
@A9x-AkhilReddy 2 ай бұрын
No bro I don't do that .
@sw4pn3h0x8
@sw4pn3h0x8 2 ай бұрын
Bounty?
@A9x-AkhilReddy
@A9x-AkhilReddy 2 ай бұрын
Scam .no reply from their side 3 months ago report .
@vishnuyadav5583
@vishnuyadav5583 2 ай бұрын
Same here no bounty
@A9x-AkhilReddy
@A9x-AkhilReddy 2 ай бұрын
@@vishnuyadav5583 yemi cheyala lemu bro .leave it .
@Gaffein
@Gaffein 2 ай бұрын
My 2 months old sibling can find it in 2 seconds
@A9x-AkhilReddy
@A9x-AkhilReddy 2 ай бұрын
You are welcome
@MohitSharma-dv7mg
@MohitSharma-dv7mg 2 ай бұрын
Nice find!
@securityempire
@securityempire 5 ай бұрын
Any bounty?
@A9x-AkhilReddy
@A9x-AkhilReddy 5 ай бұрын
No bro . They are saying we are leave this as intentionally. It not a duplicate and not eligible for reward
@razmjumehdi9069
@razmjumehdi9069 5 ай бұрын
👏👏👏👏👏
@SakayaNagii
@SakayaNagii 5 ай бұрын
Reward?
@A9x-AkhilReddy
@A9x-AkhilReddy 5 ай бұрын
No response bro .they patched the report . I reported 5 bugs CSTI , Stored xss ,XSS,BAC, privilege escalation
@SakayaNagii
@SakayaNagii 5 ай бұрын
@@A9x-AkhilReddy thats sad let me know if you got any response, i was too deciding to submit some on code chef
@A9x-AkhilReddy
@A9x-AkhilReddy 5 ай бұрын
@@SakayaNagii no bro you didn't get any response from their side . if you report they are simply patch the report and didn't respond to your mail . waste of time to participate in that
@SakayaNagii
@SakayaNagii 5 ай бұрын
@@A9x-AkhilReddy alright thanks, can we share some programs?
@A9x-AkhilReddy
@A9x-AkhilReddy 5 ай бұрын
@@SakayaNagii you can hack on taxdome , nimvelo, simwood
@STORYLINE-TELUGU
@STORYLINE-TELUGU 6 ай бұрын
Bro did you know telugu
@A9x-AkhilReddy
@A9x-AkhilReddy 6 ай бұрын
Yup i know telugu