| Blog | https://blog.stellersjay.pub |
| Twitter /X | https://twitter.com/call_eax |
| Bluesky | https://bsky.app/profile/calleax.bsky.social |
I often tend to delay or forget to post my methodology which I believe is actually the missing component to vulnerability research.
Learning from issues trackers and blog post is baseline but also having your own swagger to the research is a must.
I do enjoy tackling hard problems :)
Pro Tip: Dive into bug trackers. I’ve found huge value in studying previously reported and resolved bugs with security impact (vulnerabilities).
Why it's great:
- Learn unfamiliar subsystems.
- Follow real-world PoCs from start to finish.
- Apply insights directly to your own targets.
This practice has been consistently sharping my skills both for dev and security.
Mythical API defense 🧌 found:
- Found a forbidden (403) path
- Check for subpaths beyond that
- Found an image
- Sub-sequential response length grew from 1034 to 830319 🙃
Great defense or it's a bug...
Bug Hunting Tip:
- 💯 Build your own API wordlist.
- Why? Public lists are too well-known and overused.
- Craft one tailored to your hunt for a competitive edge.
- Don’t forget to test these wordlists on URL subpaths, you might uncover unique bypasses.
Someone want to tell me what MURL Package Format ?!? I believe is definitely game related.
4d 55 52 4c 28 bd 06 00 52 50 4b 47 48 45 41 44 4c 00 00 00
What would be the Java equivalent to K&R C Programming book?