How I Hacked an Entrepreneur
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住关键点。 文章开头提到用户在使用Google Dorks寻找漏洞赏金计划时,发现了一个私有的VDP。虽然这个VDP有点旧,但用户决定尝试一下。接着,用户运行了Feroxbuster进行目录爆破,找到了/admin路径。然后,用户绕过了登录机制,更改了密码以访问管理portal。发现网站使用302重定向,通过将响应改为200 OK绕过了这个机制,并成功更改了管理员密码。最后附上了一个视频演示。 现在我需要把这些信息浓缩到100字以内。要确保包含发现VDP、目录爆破找到/admin、绕过登录、利用302重定向漏洞、更改密码以及视频演示这些关键点。 可能的结构是:用户通过Google Dorks找到私有VDP,在目录爆破后发现/admin路径,绕过登录并利用302重定向漏洞更改密码,并附有视频演示。 这样就能在100字以内准确传达文章内容。 </think> 用户通过Google Dorks发现私有漏洞赏金计划(VDP),使用Feroxbuster进行目录爆破后找到/admin路径,并成功绕过登录机制和利用302重定向漏洞更改管理员密码,附有视频演示。 2025-12-17 06:30:58 Author: infosecwriteups.com(查看原文) 阅读量:10 收藏

StvRoot

Press enter or click to view image in full size

If you find out you win

I was searching for a bug bounty programme using google dorks when I found a private vdp. It was a bit old but I thought why not give it a try

Press enter or click to view image in full size

Directory Bruteforcing

First thing, without even looking into anything (Considering the situation, I didn’t want to involve much of my time deep diving into it), I ran feroxbuster and found /admin.

It was decent looking and that’s exactly I should not test it.

Well, I bypassed the login thing and changing the password to access the portal XD.

It had a major flaw. The website was using 302 Found status code to redirect the users and changing the response to 200 OK bypassed it. I was able to change the Admin Password as well.

Here is a video demonstration of the same


文章来源: https://infosecwriteups.com/how-i-hacked-an-entrepreneur-19d270a62c5c?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh