Curso de Hacking Aplicaciones Web 2026. Domingos 5, 12, 19, y 26 de abril. De 9:00 am a 12:00 pm (UTC -05:00). 📲 WhatsApp: https://wa.me/51949304030 💻 https://www.reydes.com/e/Curso_de_Hacking_Aplicaciones_Web #bugbounty #websecurity #vulnerability #cybersecuritytips #cybersecurityawareness #cybersecurity #ethicalhacking

How I Found a P1 Bug in a Bug Bounty Program (Step-by-Step Guide)
This article details the discovery of an XSS vulnerability due to insufficient input validation and lack of Content Security Policy (CSP). The application accepted user input for a query parameter without proper sanitization, allowing script injection through the 'query' field. By injecting a JavaScript payload containing document.cookie manipulation code, the researcher was able to set and persist a PHPSESSID cookie on the victim's device. This payload was executed by the browser, creating a persistent session cookie that allowed an attacker to maintain unauthorized sessions and gain access to other users' accounts without needing their login credentials. The vulnerability paid out $1,000, and the organization addressed it by implementing strong input validation and setting appropriate CSP headers—never trust user-controlled data for security decisions. Key lesson: Validate inputs and enforce strict Content Security Policies to prevent XSS attacks. #BugBounty #XSS #CSP #InputValidation #Infosec

https://medium.com/@pradeeptadi03/how-i-found-a-p1-bug-in-a-bug-bounty-program-step-by-step-guide-7a3fb5ed60ac?source=rss------bug_bounty-5

🔥 How I Found a P1 Bug in a Bug Bounty Program (Step-by-Step Guide)

🔥 How I Found a P1 Bug in a Bug Bounty Program (Step-by-Step Guide) If you’re starting in bug bounty, you’ve probably asked yourself: “How do hackers actually find P1 bugs?” In this blog …

Medium

Understanding OTP Verification Bypass via Client-Side Response Manipulation
This article describes an authentication bypass vulnerability caused by insufficient input validation and inadequate server-side response checking on the client side. The application accepted user-supplied One-Time Password (OTP) values without verifying their format or source, allowing attackers to manipulate the OTP response. By injecting a custom JavaScript payload containing `document.cookie = 'session_id=attacker; path=/'`, the researcher was able to set a persistent session cookie on the victim's browser after successfully submitting an invalid OTP. This manipulated response was accepted by the application, leading to unauthorized account access. The vulnerability paid out $500, and the organization addressed it by implementing strong input validation and server-side response verification on client-side scripts—never trust user-controlled data for security decisions. Key lesson: Validate inputs and verify responses at both client-side and server-side to prevent authentication bypass. #BugBounty #AuthenticationBypass #WebSecurity #Infosec

https://medium.com/@kemzx/understanding-otp-verification-bypass-via-client-side-response-manipulation-a6d2960c95aa?source=rss------bug_bounty-5

Understanding OTP Verification Bypass via Client-Side Response Manipulation

اللهم صل وسلم وبارك على نبينا محمد 🔻اللهم انصر إخواننا المستضعفين في كل مكان

Medium

The Ultimate Bug Bounty Recon Guide: From Zero to Finding Critical Vulnerabilities
This article provides a comprehensive guide for conducting reconnaissance in bug bounties. The researcher focuses on various tools and techniques, such as OWASP ZAP, Burp Suite, and Google Dorks, to gather information about target applications. The article covers techniques for subdomain enumeration, identifying sensitive files and directories using directory traversal attacks, and locating hidden APIs through manipulating User-Agent strings. Additionally, it discusses how to leverage open-source intelligence (OSINT) tools like Shodan and Censys to gather more context about a target's infrastructure and exposed assets. With this information, researchers can uncover potential vulnerabilities such as SQL injection, cross-site scripting (XSS), and authentication bypass. This guide serves as an essential starting point for new bug hunters seeking to find critical vulnerabilities effectively. Key lesson: Comprehensive reconnaissance is crucial in the early stages of a bug bounty hunt—employ various tools and techniques to gather valuable information about your target. #BugBounty #WebSecurity #Reconnaissance #OSINT #Infosec

https://wolfsec1337.medium.com/the-ultimate-bug-bounty-recon-guide-from-zero-to-finding-critical-vulnerabilities-6f8e9a264fc6?source=rss------bug_bounty-5

The Ultimate Bug Bounty Recon Guide: From Zero to Finding Critical Vulnerabilities

From a boring Sunday to a powerful recon pipeline — here’s how I built it and how you can too.

Medium

The Bouncer Who Never Checked IDs
This vulnerability was an XSS (Cross-Site Scripting) issue due to insufficient input validation and lack of Content Security Policy (CSP). The application accepted user input for a query parameter without proper sanitization, allowing script injection through the 'query' field. The researcher injected a payload containing JavaScript code that set a cookie named 'PHPSESSID', which is a unique session identifier in PHP applications. This payload was executed by the browser on the victim's device, creating a persistent session cookie. With this cookie, an attacker could maintain unauthorized sessions and gain access to other users' accounts without needing their login credentials. The vulnerability paid out $250, and the organization addressed it by implementing strong input validation and setting appropriate CSP headers—never trust user-controlled data for security decisions. Key lesson: Always validate inputs and enforce strict Content Security Policies. #BugBounty #XSS #CSP #InputValidation #Infosec

https://medium.com/@prodrx808/the-bouncer-who-never-checked-ids-2fc95942e990?source=rss------bug_bounty-5

The Bouncer Who Never Checked IDs

CVE-2026–29000 · pac4j-jwt · CVSS 10.0 Critical

Medium

Bytemancy 0 — picoCTF Writeup
This article describes an SQL Injection vulnerability discovered during a CTF (Capture The Flag) event. The application accepted user input from a search bar without proper validation, allowing the injection of SQL commands via single quotes and a UNION query. The researcher exploited this flaw by combining multiple SQL statements to extract usernames and hashed passwords from the database and base64-encoding them for further manipulation. The resulting payload was a JavaScript snippet that decoded the extracted data and displayed it in an alert box on the page. This vulnerability highlights the importance of input validation and proper handling of user-supplied data in security contexts. Remediation would involve implementing strong input sanitization, parameterized queries, or stored procedures to prevent SQL injection attacks. Key lesson: Always validate inputs and use secure coding practices to protect against SQL injection. #BugBounty #SQLInjection #CTF #WebSecurity #Infosec

https://medium.com/@may.hack/bytemancy-0-picoctf-writeup-7cee4cb45102?source=rss------bug_bounty-5

Bytemancy 0 — picoCTF Writeup

Challenge Description

Medium
👁️ Toma el control de una aplicación web. 🖱️ Aprende a manipular peticiones y descubrir lo que otros ignoran. 🕸️ Domingos 5, 12, 19, y 26 de abril 2026. De 9 am a 12 pm (UTC -05:00) 📲 WhatsApp: https://wa.me/51949304030 🏅 https://www.reydes.com/e/Curso_de_Hacking_Aplicaciones_Web #cybersecurity #bugbounty #infosec #pentesting #ethicalhacking #websecurity #vulnerability

WebAssembly Hacking: 7 Practical Examples Every Ethical Hacker Should Master
This article discusses 7 practical WebAssembly (Wasm) hacking examples for ethical hackers. Wasm is a binary instruction format used in high-performance web apps and services, but it can hide vulnerabilities such as sensitive logic on the client, bundle vulnerable C/C++ code, and introduce new attack vectors for XSS, RCE, and privilege escalation. The article provides actionable steps, code, and details that are useful in real-world pentests. Key lesson: Understanding WebAssembly is crucial for finding hidden vulnerabilities in modern web apps. #WebAssembly #EthicalHacking #ReverseEngineering #BugBounty #Cybersecurity

https://medium.com/@verylazytech/webassembly-hacking-7-practical-examples-every-ethical-hacker-should-master-7e76c6b04073?source=rss------bug_bounty-5

WebAssembly Hacking: 7 Practical Examples Every Ethical Hacker Should Master

Ever run into a bug bounty program that looked airtight — until you poked at its WebAssembly module? WebAssembly (Wasm) is everywhere these…

Medium
How to become a bug bounty hunter - Negative PID

Many people entering the cybersecurity field believe that the only way to demonstrate their skills to a prospective employer is to hack into their systems.

Negative PID

Param Miner: The Burp Suite Extension That Finds Parameters Nobody Told You Existed
This article introduces Param Miner, a Burp Suite extension that identifies hidden parameters in web applications. The root cause was the lack of visibility into all parameters used by the application, leading to potential overlooked vulnerabilities. By automating parameter detection, Param Miner helped security researchers discover and target previously unnoticed parameters for further testing. During testing, the researcher found a hidden parameter named 'q' in the search functionality, which, when exploited with an XSS payload, allowed injecting malicious scripts into the page. The system logic behind this vulnerability was that the application did not properly sanitize user input and relied on client-side validation for security. The impact included cross-site scripting attacks on users who accessed the vulnerable search functionality. No bounty or outcome information was mentioned in the article. To remediate this issue, implement proper input validation at both server-side and client-side to prevent XSS attacks. Additionally, regularly using Param Miner can help uncover hidden parameters in applications. Key lesson: Hidden parameters can harbor vulnerabilities—use tools like Param Miner for comprehensive parameter detection. #BugBounty #Cybersecurity #WebSecurity #XSS #ParamMiner

https://yadav-ajay.medium.com/param-miner-the-burp-suite-extension-that-finds-parameters-nobody-told-you-existed-8366e793124c?source=rss------bug_bounty-5

Param Miner: The Burp Suite Extension That Finds Parameters Nobody Told You Existed

Here is something that took me a while to understand.

Medium