How I Hacked an Entrepreneur
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读用户提供的文章内容。看起来这篇文章是关于一个安全研究人员通过Google Dorks发现了一个私有漏洞赏金计划(VDP),然后进行了一些测试。 文章提到他使用了Feroxbuster进行目录爆破,找到了/admin页面。接着,他绕过了登录机制,修改了密码。这里的关键点是网站使用了302重定向状态码,而他通过将响应改为200 OK来绕过这个重定向,成功更改了管理员密码,并且还附带了一个视频演示。 接下来,我需要将这些信息浓缩到100字以内。要注意不使用“文章内容总结”或“这篇文章”这样的开头,直接描述内容。重点包括发现VDP、目录爆破找到/admin、绕过登录和重定向、更改密码以及视频演示。 可能会这样组织语言:“作者通过Google Dorks发现私有VDP并尝试测试。使用Feroxbuster找到/admin页面后,绕过登录机制和302重定向(改为200 OK),成功更改管理员密码,并附上视频演示。” 这样既涵盖了主要步骤,又控制在了字数限制内。 </think> 作者通过Google Dorks发现私有漏洞赏金计划(VDP),尝试后利用Feroxbuster找到/admin页面并绕过登录机制及302重定向(改为200 OK),成功更改管理员密码,并附上视频演示。 2025-12-17 06:30:58 Author: infosecwriteups.com(查看原文) 阅读量:10 收藏

StvRoot

Press enter or click to view image in full size

If you find out you win

I was searching for a bug bounty programme using google dorks when I found a private vdp. It was a bit old but I thought why not give it a try

Press enter or click to view image in full size

Directory Bruteforcing

First thing, without even looking into anything (Considering the situation, I didn’t want to involve much of my time deep diving into it), I ran feroxbuster and found /admin.

It was decent looking and that’s exactly I should not test it.

Well, I bypassed the login thing and changing the password to access the portal XD.

It had a major flaw. The website was using 302 Found status code to redirect the users and changing the response to 200 OK bypassed it. I was able to change the Admin Password as well.

Here is a video demonstration of the same


文章来源: https://infosecwriteups.com/how-i-hacked-an-entrepreneur-19d270a62c5c?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh