Tips 1:
HTTP Request Smuggling on business.apple.com
苹果厂商的一个协议走私漏洞。
详情:
https://medium.com/@StealthyBugs/http-request-smuggling-on-business-apple-com-and-others-2c43e81bcc52
Tips 2:
When you look up your target’s ASN you’ll find their ipv4 & ipv6 ranges. Here’s a one-liner to request all the webserver’s SSL certificates and parse them for NEW TLD’s, domains, and subdomains.
前有一键日卫星(玄道:怀疑你在内涵我),今有一键IP转domain。
echo CIDR | httpx -t 100 | nuclei -t nuclei-templates/ssl/ssl-dns-names.yaml | cut -d " " -f7 | cut -d "]" -f1| sed 's/[//'| sed 's/,/n/g'| sort -u
Tip 3:
If you failed to get anything in the Web application, Don’t forget to check the Mobile applications
翻译过来就是:山穷水尽疑无路,柳暗花明又一村。如果WEB上挖不到洞,那么就去打移动APP的主意。
作者证明了思路可行性:
Tips 4:
赏金平台大全,我之前也没想过有这么多,存下来存下来~
Bug Bounty Platforms
-HackerOne
-Bugcrowd
-Intigritti
-Detectify
-Google VRP
-Synack
-Cobalt
-Zerocopter
-BugBounty.jp
-YesWeHack
-HackenProof
-Open Bug Bounty
-Vulnerability-Lab
-SafeHats
-Yogosha
-Cyber Army ID
-AntiHack
-RedStorm
-FireBounty
最后三上镇楼,加油加油加油~
原文始发于微信公众号(奔跑在Hackerone的路上):Bug Bounty Tips(2022-04-25)