Biscuit's Bug Bounty Playbook
  • ๐Ÿ‘‹Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • ๐ŸงพResume For Cyber Security Freshie
    • ๐Ÿ“—Browser extension For Bug Bounty
    • ๐Ÿ“€POC Videos YT Channel
    • ๐Ÿ“บ55 YouTube Channels To Learn Hacking
    • ๐Ÿ‘€Hackers to Follow on Social Media
      • Twitter
      • Medium
      • YouTube
      • GitHub
      • Discord Server
      • Security GitBooks
    • ๐Ÿ…Learn The Basics
      • ๐ŸŽ–๏ธType Of Cyber Security
      • ๐ŸฅˆCommon Job Roles
      • ๐Ÿฅ‰Get Started With InfoSec
      • โš•๏ธBest Bug Bounty Platform
      • ๐Ÿ—ž๏ธBest InfoSec Writeups Website
      • ๐ŸชHacking Books
      • ๐Ÿฅ‚CLI Commands
      • ๐Ÿ’ฟLearn WSL
    • ๐Ÿ‘ฉโ€๐Ÿ’ปFun Programming Codes
    • ๐Ÿ”ฎBuild your own Bug Bounty Methodology
    • ๐ŸŽดBug Bounty Checklist
  • Learn Android Bug Bounty
    • ๐ŸŽฅVideo Tutorials
  • โค๏ธYouTube Channels
  • ๐Ÿ“ฐBug Bounty Reports
  • ๐Ÿ“šBlogs & Writeups
  • ๐ŸนGitHub Repository
  • ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งConference Talks
  • ๐Ÿ–จ๏ธAutomated Scanners
  • โš™๏ธIntentionally Vulnerable Apps
  • ๐ŸŽฑLearn Drozer For Android Pentesting
  • ๐Ÿช€Learn Frida For Android Pentesting
  • ๐ŸˆBypassing Security Protections in APKs via Objection and Frida
  • ๐ŸชSecurity Tools For Android Pentesting
  • ๐ŸŽนCLI Commands & Shortcuts
  • Bug Bounty Reports & Articles
    • 0๏ธโƒฃIndex
    • 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)
      • ๐ŸšกSub Domain Takeover
      • ๐Ÿš Account Takeover
      • ๐ŸšŸdependency confusion vulnerability
    • 2๏ธโƒฃIDOR (Indirect Object Reference)
    • 3๏ธโƒฃLeaks & Disclosure (PII, API Key, etc)
    • 4๏ธโƒฃOpen Redirects
    • 5๏ธโƒฃRequest Forgery (CSRF & SSRF)
      • ๐ŸŸขCSRF
      • ๐Ÿ”ดSSRF
    • 6๏ธโƒฃInjections (HTML, XSS, etc)
      • ๐ŸŸกXSS
      • ๐ŸŸ HTML Injection
      • โšซSQL Injection
      • ๐ŸŸฃCR/LF Injection
      • ๐ŸŸขSSTI
      • ๐Ÿ”ดHost Header Injection
      • ๐Ÿ”ตCSV Injection
    • 7๏ธโƒฃBroken Access Control & Broken Authentication
      • โš™๏ธFile Upload Functionality
      • โš™๏ธPassword Reset Functionality
      • โš™๏ธ2FA Functionality
      • โš™๏ธOauth Functionality
      • โš™๏ธBypassing
      • โš™๏ธMisconfiguration
      • โš™๏ธCaptcha Bypass
    • 8๏ธโƒฃWeb Socket
    • 9๏ธโƒฃMiscellaneous Reports
    • ๐ŸงปRole Management Issue
    • 0๏ธCloud
      • ๐ŸŒฉ๏ธAWS S3
    • 1๏ธLow Hanging Fruits
    • 2๏ธCache Vulnerabilities
    • 3๏ธDOS/DDOS
  • 4๏ธForced Browsing
  • Bug Bounty Platforms
    • ๐Ÿ›BugCrowd
    • ๐ŸžHackerOne
    • ๐ŸIntigriti
    • ๐ŸœOpen Bug Bounty
  • Exploiting Technologies
    • 0๏ธโƒฃIntroduction
    • 1๏ธโƒฃWordpress
    • 2๏ธโƒฃGraphQL API
    • 3๏ธโƒฃIDOR Vulnerability
Powered by GitBook
On this page

Bug Bounty Reports

Category
Title
Link
Notes

Hardcoded credentials

Disclosure of all uploads via hardcoded api secret

-

WebView

Android security checklist: WebView

-

Insecure deeplinks

Account Takeover Via DeepLink

-

Sensitive information disclosure

-

RCE/ACE

Why dynamic code loading could be dangerous for your apps: a Google example

-

RCE in TinyCards for Android

TinyCards made this report private

Persistent arbitrary code execution in Android's Google Play Core Library

Details, explanation and the PoC

CVE-2020-8913: Persistent arbitrary code execution in Google Play Core library

CVE-2020-8913

TikTok: three persistent arbitrary code executions and one theft of arbitrary files

Oversecured detects dangerous vulnerabilities in TikTok

Memory corruption

Exploiting memory corruption vulnerabilities on Android

Includes PayPal example

Cryptography

Use cryptography in mobile apps the right way

-

SQL Injection

SQL Injection in Content Provider

-

Another SQL Injection in Content Provider

-

Session theft

Steal user session

-

Steal files

Android security checklist: theft of arbitrary files

-

How to exploit insecure WebResourceResponse configurations

Includes Amazon apps example

Vulnerable to local file steal, Javascript injection, Open redirect

-

Token leakage due to stolen files via unprotected Activity

-

Steal files due to exported services

-

Steal files due to unprotected exported Activity

-

Steal files due to insecure data storage

-

Insecure local data storage, makes it easy to steal files

-

Bypasses

Accidental $70k Google Pixel Lock Screen Bypass

-

Golden techniques to bypass host validations

-

Two-factor authentication bypass due to vuln endpoint

-

Another endpoint Auth bypass

-

Bypass PIN/Fingerprint lock

-

Bypass lock protection

-

Bypass of biometrics security functionality

-

XSS

HTML Injection in BatterySaveArticleRenderer WebView

-

XSS via SAMLAuthActivity

-

XSS in ImageViewerActivity

-

XSS via start ContentActivity

-

XSS on Owncloud webview

-

Privilege Escalation

20 Security Issues Found in Xiaomi Devices

-

Discovering vendor-specific vulnerabilities in Android

-

Common mistakes when using permissions in Android

-

Two weeks of securing Samsung devices: Part 2

-

Two weeks of securing Samsung devices: Part 1

-

Intent Spoofing

-

Access of some not exported content providers

-

Access protected components via intent

-

Fragment injection

-

Javascript injection

-

CSRF

Deeplink leads to CSRF in follow action

-

Case sensitive account collisions

overwrite account associated with email via android application

-

Intercept Broadcasts

Possible to intercept broadcasts about file uploads

-

Vulnerable exported broadcast reciever

-

View every network request response's information

-

Critical LFI vulnerability in Content Provider

Content Provider Local File Inclusion

-

PreviousYouTube ChannelsNextBlogs & Writeups

Last updated 18 days ago

๐Ÿ“ฐ
HackerOne Report
Blog Post
HackerOne Report
HackerOne Report
Blog Post
HackerOne Report
HackerOne Report
Blog Post
Blog Post
Blog Post
Blog Post
HackerOne Report
HackerOne Report
HackerOne Report
Blog Post
Blog Post
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
Blog Post
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
Blog Post
Blog Post
Blog Post
Blog Post
Blog Post
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
HackerOne Report
POC Video