blog.securitybreached.org Open in urlscan Pro
209.172.2.100  Public Scan

Submitted URL: http://blog.securitybreached.org/
Effective URL: https://blog.securitybreached.org/
Submission: On December 02 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

POST #

<form action="#" method="post" accept-charset="utf-8" data-blog="136848008" data-post_access_level="everybody" data-subscriber_email="" id="subscribe-blog">
  <div class="wp-block-jetpack-subscriptions__form-elements">
    <p id="subscribe-email">
      <label id="subscribe-field-label" for="subscribe-field" class="screen-reader-text"> Type your email… </label>
      <input required="required" type="email" name="email" class="no-border-radius " style="font-size: 16px;padding: 15px 23px 15px 23px;border-radius: 0px;border-width: 1px;" placeholder="Type your email…" value="" id="subscribe-field">
    </p>
    <p id="subscribe-submit">
      <input type="hidden" name="action" value="subscribe">
      <input type="hidden" name="blog_id" value="136848008">
      <input type="hidden" name="source" value="https://blog.securitybreached.org/">
      <input type="hidden" name="sub-type" value="subscribe-block">
      <input type="hidden" name="redirect_fragment" value="subscribe-blog">
      <input type="hidden" id="_wpnonce" name="_wpnonce" value="9f4c8cec06"><input type="hidden" name="post_id" value="586"> <button type="submit" class="wp-block-button__link no-border-radius"
        style="font-size: 16px;padding: 15px 23px 15px 23px;margin: 0px; margin-left: 10px;border-radius: 0px;border-width: 1px;" name="jetpack_subscriptions_widget"> Subscribe </button>
    </p>
  </div>
</form>

<form id="jp-carousel-comment-form">
  <label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
  <textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
  <div id="jp-carousel-comment-form-submit-and-info-wrapper">
    <div id="jp-carousel-comment-form-commenting-as">
      <fieldset>
        <label for="jp-carousel-comment-form-email-field">Email (Required)</label>
        <input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-author-field">Name (Required)</label>
        <input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-url-field">Website</label>
        <input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
      </fieldset>
    </div>
    <input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment">
  </div>
</form>

Text Content

Skip to content


SECURITY BREACHED BLOG

One step at a time There's no need to rush It's like learning to fly!

Menu
 * Home
 * $whoami
 * Bug Bounty Blueprint: A Beginner’s Guide

Menu




BUG BOUNTY BLUEPRINT: A BEGINNER’S GUIDE

Posted on August 18, 2023August 18, 2023 by Muhammad Khizer Javed

This guide is a must-read for beginners to dive into Bug Bounty Hunting. It
provides foundational skills, tips, tools, and resources for Bug Bounty Hunters.
I’ve covered various aspects including vulnerabilities and learning resources.
Are you ready to embark on your Bug Bounty adventure?


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * Reddit
 * Tumblr
 * Telegram
 * WhatsApp
 * Email
 * 


LIKE THIS:

Like Loading...
Read more


HOW I MANIPULATED MY RANK ON THE BUGCROWD PLATFORM

Posted on April 19, 2023August 17, 2023 by Muhammad Khizer Javed

This vulnerability on the Bugcrowd platform allowed manipulating rank on the
platform using the API.


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * Reddit
 * Tumblr
 * Telegram
 * WhatsApp
 * Email
 * 


LIKE THIS:

Like Loading...
Read more


HACKING 100K+ LOYALTY PROGRAMS FOR FUN AND PROFIT!

Posted on May 19, 2022May 19, 2022 by Muhammad Khizer Javed

This blog post is about how a hacker could have Hacked 100k+ Loyalty Programs to
get free points & redeem them for free stuff or coupons.


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * Reddit
 * Tumblr
 * Telegram
 * WhatsApp
 * Email
 * 


LIKE THIS:

Like Loading...
Read more


HACKING SUBSCRIPTION PLANS FOR FREE SERVICE.

Posted on February 27, 2022May 19, 2022 by Muhammad Khizer Javed


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * Reddit
 * Tumblr
 * Telegram
 * WhatsApp
 * Email
 * 


LIKE THIS:

Like Loading...
Read more


USING INSPECT ELEMENT TO BYPASS SECURITY RESTRICTIONS | BUG BOUNTY POC

Posted on June 30, 2020May 22, 2022 by Muhammad Khizer Javed

Hey guys so this blog post is about bug bounty report, I was able to Bypass
Security restrictions by using inspect element and use Paid Features. About the
Issue: The issue is really simple to execute. I was looking for a way to use the
service for free and managed to find it so easily…


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * Reddit
 * Tumblr
 * Telegram
 * WhatsApp
 * Email
 * 


LIKE THIS:

Like Loading...
Read more


PLAYING WITH JSON WEB TOKENS FOR FUN AND PROFIT

Posted on April 4, 2020May 19, 2022 by Muhammad Qasim Munir

Hey Everyone, I hope you all are fine and doing well. Today I wanna share
something related JSON Web Tokens (JWT). In this writeup, I’ll tell you how I
was able to confirm emails without confirmation tokens, reset password as well
as taking over company emails. So let’s start. What is JSON Web Token? JSON…


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * Reddit
 * Tumblr
 * Telegram
 * WhatsApp
 * Email
 * 


LIKE THIS:

Like Loading...
Read more


MICROSOFT APACHE SOLR RCE VELOCITY TEMPLATE | BUG BOUNTY POC

Posted on March 31, 2020May 22, 2022 by Muhammad Khizer Javed

Hey guys so this blog post is about RCE issue reported to Microsoft bug bounty
program, Remote Code execution issue existed in microsoft.com subdomain running
Apache Solr.   I’ll try to be as simple as possible. Participated in Microsoft
Bug Bounty Program first time.. About the RCE: While doing some recon on
microsoft.com website i…


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * Reddit
 * Tumblr
 * Telegram
 * WhatsApp
 * Email
 * 


LIKE THIS:

Like Loading...
Read more


GETTING STARTED IN ANDROID APPS PEN-TESTING (PART-1)

Posted on March 17, 2020May 22, 2022 by Muhammad Khizer Javed

Hey Everyone, My name is M.Qasim Munir and this is my first blog article that
I’m writing about getting started in android apps pen-testing. I hope this
article will help you with learning something new. Getting Started in Android
apps Pen-testing (PART-1):   Amazing development and growth in mobile apps have
carried a bunch of…


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * Reddit
 * Tumblr
 * Telegram
 * WhatsApp
 * Email
 * 


LIKE THIS:

Like Loading...
Read more


HACKING SMS API SERVICE PROVIDER OF A COMPANY |ANDROID APP STATIC SECURITY
ANALYSIS | BUG BOUNTY POC

Posted on February 19, 2020May 22, 2022 by Muhammad Khizer Javed

Hey guys so this blog post is about doing static analysis of an Android App, And
due to insecure storage of SMS API credentials I was able to Takeover the SMS
API here’s a Short POC of the issue.


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * Reddit
 * Tumblr
 * Telegram
 * WhatsApp
 * Email
 * 


LIKE THIS:

Like Loading...
Read more


EXPLOITING INSECURE FIREBASE DATABASE!

Posted on February 4, 2020May 22, 2022 by Muhammad Khizer Javed

Hey guys so this blog post is about Exploiting Insecure Firebase Databases, due
to Improper set security rules one can write data to the database in certain
conditions here’s a Short POC tutorial of the issue. A few days ago i was doing
static analysis of an Android app on a bug bounty target, as…


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * Reddit
 * Tumblr
 * Telegram
 * WhatsApp
 * Email
 * 


LIKE THIS:

Like Loading...
Read more
 * 1
 * 2
 * 3
 * 4
 * 5
 * Next

Type your email…

Subscribe


© 2023 Security Breached Blog | Powered by Minimalist Blog WordPress Theme
Menu
 * Home
 * $whoami
 * Bug Bounty Blueprint: A Beginner’s Guide
 * 


 

Loading Comments...

 

Write a Comment...
Email (Required) Name (Required) Website


%d bloggers like this:


Thank you for visiting. You can now buy me a coffee!