Главная
Study mode:
on
1
Intro
2
Who am I
3
Outline
4
Disclaimer
5
Approaching a new target
6
Who built the site
7
Chaining vulnerabilities
8
AEM
9
Target Apps
10
Slack
11
Scope
12
Useruid Leak
13
Privilege Escalation
14
Admin Endpoint
15
Intel Jenkins
16
Outro
Description:
Explore advanced bug bounty techniques focusing on out-of-scope asset reconnaissance in this 16-minute conference talk from h@cktivitycon 2020. Learn how to leverage unconventional recon methods to uncover vulnerabilities in core applications without directly hacking out-of-scope assets. Discover Jr0ch17's proven strategies for finding unique bugs, including reflected XSS, RCE, and information disclosure. Gain insights into approaching new targets, identifying site builders, chaining vulnerabilities, and exploiting various platforms like AEM, Slack, and Jenkins. Enhance your bug hunting skills and increase your chances of discovering high-impact, non-duplicate vulnerabilities in bug bounty programs.

Beyond the Borders of Scope

HackerOne
Add to list
0:00 / 0:00