بسم الله الرحمن الرحيم It is a private program I have being hacking on for months, one night I realised that they added another security layer, a second factor authentication(2FA), like every bug bounty hunter I tried to see if …
Introduction It will be a nice Idea to start your automation in the background while you test for bugs manually. In this write up I will take you through the process I followed in my automation methodology , thought I didn't …
Introduction If you are a beginner in bug bounty hunting you need to start hunting on U.S. Department of defence program, although it is a VDP(Vulnerability Disclosure Program) it will really help get a lot of things, one of the…
Introduction Subdomain takeover is among the type of bugs that are hard to find for newbie hackers because people like @todayisnew and other great hackers have automated script that will be monitoring and notifying this kind of b…
In this blog I will be sharing you two amazing tools that I used to find 11 cross site scripting bug on a website for a public program on Intigriti. This time around I have not being getting private invitations on HackerOne as b…
Last week I decided to start hacking on Intigriti bug bounty platform, after submitting 11 reflected cross site scripting bug to a public program there, 4 of them were accepted and the rest were closed as duplicates and some inf…
During the quarantine I decided to learn some computer skills, bug bounty seems to be the one I chose, after some sleepless nights of learning and getting my first bounty from Logitech Inc on November 2020, I started hunting on …