blog.securitybreached.org
Open in
urlscan Pro
209.172.2.100
Public Scan
Submitted URL: http://blog.securitybreached.org/
Effective URL: https://blog.securitybreached.org/
Submission: On December 02 via api from US — Scanned from DE
Effective URL: https://blog.securitybreached.org/
Submission: On December 02 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMPOST #
<form action="#" method="post" accept-charset="utf-8" data-blog="136848008" data-post_access_level="everybody" data-subscriber_email="" id="subscribe-blog">
<div class="wp-block-jetpack-subscriptions__form-elements">
<p id="subscribe-email">
<label id="subscribe-field-label" for="subscribe-field" class="screen-reader-text"> Type your email… </label>
<input required="required" type="email" name="email" class="no-border-radius " style="font-size: 16px;padding: 15px 23px 15px 23px;border-radius: 0px;border-width: 1px;" placeholder="Type your email…" value="" id="subscribe-field">
</p>
<p id="subscribe-submit">
<input type="hidden" name="action" value="subscribe">
<input type="hidden" name="blog_id" value="136848008">
<input type="hidden" name="source" value="https://blog.securitybreached.org/">
<input type="hidden" name="sub-type" value="subscribe-block">
<input type="hidden" name="redirect_fragment" value="subscribe-blog">
<input type="hidden" id="_wpnonce" name="_wpnonce" value="9f4c8cec06"><input type="hidden" name="post_id" value="586"> <button type="submit" class="wp-block-button__link no-border-radius"
style="font-size: 16px;padding: 15px 23px 15px 23px;margin: 0px; margin-left: 10px;border-radius: 0px;border-width: 1px;" name="jetpack_subscriptions_widget"> Subscribe </button>
</p>
</div>
</form>
<form id="jp-carousel-comment-form">
<label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
<textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
<div id="jp-carousel-comment-form-submit-and-info-wrapper">
<div id="jp-carousel-comment-form-commenting-as">
<fieldset>
<label for="jp-carousel-comment-form-email-field">Email (Required)</label>
<input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
</fieldset>
<fieldset>
<label for="jp-carousel-comment-form-author-field">Name (Required)</label>
<input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
</fieldset>
<fieldset>
<label for="jp-carousel-comment-form-url-field">Website</label>
<input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
</fieldset>
</div>
<input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment">
</div>
</form>
Text Content
Skip to content SECURITY BREACHED BLOG One step at a time There's no need to rush It's like learning to fly! Menu * Home * $whoami * Bug Bounty Blueprint: A Beginner’s Guide Menu BUG BOUNTY BLUEPRINT: A BEGINNER’S GUIDE Posted on August 18, 2023August 18, 2023 by Muhammad Khizer Javed This guide is a must-read for beginners to dive into Bug Bounty Hunting. It provides foundational skills, tips, tools, and resources for Bug Bounty Hunters. I’ve covered various aspects including vulnerabilities and learning resources. Are you ready to embark on your Bug Bounty adventure? SHARE THIS: * Twitter * Facebook * LinkedIn * Reddit * Tumblr * Telegram * WhatsApp * Email * LIKE THIS: Like Loading... Read more HOW I MANIPULATED MY RANK ON THE BUGCROWD PLATFORM Posted on April 19, 2023August 17, 2023 by Muhammad Khizer Javed This vulnerability on the Bugcrowd platform allowed manipulating rank on the platform using the API. SHARE THIS: * Twitter * Facebook * LinkedIn * Reddit * Tumblr * Telegram * WhatsApp * Email * LIKE THIS: Like Loading... Read more HACKING 100K+ LOYALTY PROGRAMS FOR FUN AND PROFIT! Posted on May 19, 2022May 19, 2022 by Muhammad Khizer Javed This blog post is about how a hacker could have Hacked 100k+ Loyalty Programs to get free points & redeem them for free stuff or coupons. SHARE THIS: * Twitter * Facebook * LinkedIn * Reddit * Tumblr * Telegram * WhatsApp * Email * LIKE THIS: Like Loading... Read more HACKING SUBSCRIPTION PLANS FOR FREE SERVICE. Posted on February 27, 2022May 19, 2022 by Muhammad Khizer Javed SHARE THIS: * Twitter * Facebook * LinkedIn * Reddit * Tumblr * Telegram * WhatsApp * Email * LIKE THIS: Like Loading... Read more USING INSPECT ELEMENT TO BYPASS SECURITY RESTRICTIONS | BUG BOUNTY POC Posted on June 30, 2020May 22, 2022 by Muhammad Khizer Javed Hey guys so this blog post is about bug bounty report, I was able to Bypass Security restrictions by using inspect element and use Paid Features. About the Issue: The issue is really simple to execute. I was looking for a way to use the service for free and managed to find it so easily… SHARE THIS: * Twitter * Facebook * LinkedIn * Reddit * Tumblr * Telegram * WhatsApp * Email * LIKE THIS: Like Loading... Read more PLAYING WITH JSON WEB TOKENS FOR FUN AND PROFIT Posted on April 4, 2020May 19, 2022 by Muhammad Qasim Munir Hey Everyone, I hope you all are fine and doing well. Today I wanna share something related JSON Web Tokens (JWT). In this writeup, I’ll tell you how I was able to confirm emails without confirmation tokens, reset password as well as taking over company emails. So let’s start. What is JSON Web Token? JSON… SHARE THIS: * Twitter * Facebook * LinkedIn * Reddit * Tumblr * Telegram * WhatsApp * Email * LIKE THIS: Like Loading... Read more MICROSOFT APACHE SOLR RCE VELOCITY TEMPLATE | BUG BOUNTY POC Posted on March 31, 2020May 22, 2022 by Muhammad Khizer Javed Hey guys so this blog post is about RCE issue reported to Microsoft bug bounty program, Remote Code execution issue existed in microsoft.com subdomain running Apache Solr. I’ll try to be as simple as possible. Participated in Microsoft Bug Bounty Program first time.. About the RCE: While doing some recon on microsoft.com website i… SHARE THIS: * Twitter * Facebook * LinkedIn * Reddit * Tumblr * Telegram * WhatsApp * Email * LIKE THIS: Like Loading... Read more GETTING STARTED IN ANDROID APPS PEN-TESTING (PART-1) Posted on March 17, 2020May 22, 2022 by Muhammad Khizer Javed Hey Everyone, My name is M.Qasim Munir and this is my first blog article that I’m writing about getting started in android apps pen-testing. I hope this article will help you with learning something new. Getting Started in Android apps Pen-testing (PART-1): Amazing development and growth in mobile apps have carried a bunch of… SHARE THIS: * Twitter * Facebook * LinkedIn * Reddit * Tumblr * Telegram * WhatsApp * Email * LIKE THIS: Like Loading... Read more HACKING SMS API SERVICE PROVIDER OF A COMPANY |ANDROID APP STATIC SECURITY ANALYSIS | BUG BOUNTY POC Posted on February 19, 2020May 22, 2022 by Muhammad Khizer Javed Hey guys so this blog post is about doing static analysis of an Android App, And due to insecure storage of SMS API credentials I was able to Takeover the SMS API here’s a Short POC of the issue. SHARE THIS: * Twitter * Facebook * LinkedIn * Reddit * Tumblr * Telegram * WhatsApp * Email * LIKE THIS: Like Loading... Read more EXPLOITING INSECURE FIREBASE DATABASE! Posted on February 4, 2020May 22, 2022 by Muhammad Khizer Javed Hey guys so this blog post is about Exploiting Insecure Firebase Databases, due to Improper set security rules one can write data to the database in certain conditions here’s a Short POC tutorial of the issue. A few days ago i was doing static analysis of an Android app on a bug bounty target, as… SHARE THIS: * Twitter * Facebook * LinkedIn * Reddit * Tumblr * Telegram * WhatsApp * Email * LIKE THIS: Like Loading... Read more * 1 * 2 * 3 * 4 * 5 * Next Type your email… Subscribe © 2023 Security Breached Blog | Powered by Minimalist Blog WordPress Theme Menu * Home * $whoami * Bug Bounty Blueprint: A Beginner’s Guide * Loading Comments... Write a Comment... Email (Required) Name (Required) Website %d bloggers like this: Thank you for visiting. You can now buy me a coffee!