How I Scored 1K Bounty Using Waybackurls
2021-08-17 23:54:38 Author: infosecwriteups.com(查看原文) 阅读量:79 收藏

Sicksec

Approaching a target from all angles

Photo by Irvan Smith on Unsplash

Hello Security Researchers,Hackers

In this write-up, I want to share with you a finding that I discovered in a public bug bounty program that ended up paying me 1K just using a single command on the terminal

I won’t be able to disclose the name of the program since the leak was huge and they are still merging all the previous algorithm they used before to a new one and the deprecated API is still reachable

The program exist in Hackerone in more than a decade with big names on them, I was familiar with the services they offer since I was a user so I started to enumerate subdomain where I noticed a weird link that may actually hold sensitive data since they are parsing everything in URL path so my first approach was checking the WaybackURLS since TomNomNom has a very unique tools I used it as follows
waybackurls requests.redacted.com

I was surprise with the amount of URLS that belongs to users with the tokens and I was like no way they’re valid right ?!

Guess I was wrong, I went to the API page and it looks like a simple POST request with the link leaked and a simple data via curl can do the Proof Of Concept using something like this

I tested in my own env and sent the report right away
It got paid under few days and the team started the fix

Never say that this program has a lot of know hackers and I won’t find a thing
everyone has it’s unique approach to a target and you may see something that other didn’t


文章来源: https://infosecwriteups.com/how-i-scored-1k-bounty-using-waybackurls-717d9673ca52?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh