Biscuit's Bug Bounty Playbook
Ctrlk
  • ๐Ÿ‘‹Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • ๐ŸงพResume For Cyber Security Freshie
    • ๐Ÿ“—Browser extension For Bug Bounty
    • ๐Ÿ“€POC Videos YT Channel
    • ๐Ÿ“บ55 YouTube Channels To Learn Hacking
    • ๐Ÿ‘€Hackers to Follow on Social Media
    • ๐Ÿ…Learn The Basics
    • ๐Ÿ‘ฉโ€๐Ÿ’ปFun Programming Codes
    • ๐Ÿ”ฎBuild your own Bug Bounty Methodology
    • ๐ŸŽดBug Bounty Checklist
    • ๐Ÿ˜ผJS Analysis for Bug Bounty
  • ๐ŸŸงLearn to Use Burp Suite
  • Learn Android Bug Bounty
    • ๐ŸŽฅVideo Tutorials
  • โค๏ธYouTube Channels
  • ๐Ÿ“ฐBug Bounty Reports
  • ๐Ÿ“šBlogs & Writeups
  • ๐ŸนGitHub Repository
  • ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งConference Talks
  • ๐Ÿ–จ๏ธAutomated Scanners
  • โš™๏ธIntentionally Vulnerable Apps
  • ๐ŸŽฑLearn Drozer For Android Pentesting
  • ๐Ÿช€Learn Frida For Android Pentesting
  • ๐ŸˆBypassing Security Protections in APKs via Objection and Frida
  • ๐ŸชSecurity Tools For Android Pentesting
  • ๐Ÿ˜ผPIDCAT for Android Bug Bounty Logging
  • ๐ŸŽนCLI Commands & Shortcuts
  • My Android Bug Bounty Lab Setup
  • Learn Thick Client Pentesting
    • ๐ŸŸฅIntroduction Videos
  • ๐Ÿ“‘Introduction Articles
  • โœ…Pentesting Checklist
  • ๐Ÿ“šBug Bounty Writeups
  • ๐ŸžThick Client Vulnerabilities
  • ๐ŸฅผIntentionally vulnerable labs
  • ๐Ÿ› ๏ธTools for Thick Client Pentesting
  • ๐Ÿ Bug Bounty Programs with Thick Client Scope
  • ๐Ÿ’ตPaid Udemy Course
  • Bug Bounty Reports & Articles
    • 0๏ธโƒฃIndex
    • 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)
      • ๐ŸšกSub Domain Takeover
      • ๐Ÿš Account Takeover
      • ๐ŸšŸdependency confusion vulnerability
    • 2๏ธโƒฃIDOR (Indirect Object Reference)
    • 3๏ธโƒฃLeaks & Disclosure (PII, API Key, etc)
    • 4๏ธโƒฃOpen Redirects
    • 5๏ธโƒฃRequest Forgery (CSRF & SSRF)
    • 6๏ธโƒฃInjections (HTML, XSS, etc)
    • 7๏ธโƒฃBroken Access Control & Broken Authentication
    • 8๏ธโƒฃWeb Socket
    • 9๏ธโƒฃMiscellaneous Reports
    • ๐Ÿ”ŸIDN Homograph Attack
    • ๐ŸงปUser-Role Management Issue
    • 0๏ธCloud
    • 1๏ธLow Hanging Fruits
    • 2๏ธCache Vulnerabilities
    • 3๏ธDOS/DDOS
  • 4๏ธForced Browsing
  • 5๏ธRCE
  • 6๏ธOSINT
  • Bug Bounty Platforms
    • ๐Ÿ›BugCrowd
    • ๐ŸžHackerOne
    • ๐ŸIntigriti
    • ๐ŸœOpen Bug Bounty
  • Exploiting Technologies
    • 0๏ธโƒฃIntroduction
    • 1๏ธโƒฃWordpress
    • 2๏ธโƒฃGraphQL API
    • 3๏ธโƒฃIDOR Vulnerability
Powered by GitBook
On this page
  1. Bug Bounty Reports & Articles
  2. 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)

๐Ÿš Account Takeover


Logo0-Click Account Takeover Earned Me โ‚ฌ900 BountyMedium
LogoOpen Redirect Validation Bypass Leads To Account Take Over (ATO)Medium
LogoFull Account Takeover Leading to RCE Remote Code ExecutionWaqas Zaka
LogoPre account takeoverMedium
LogoOauth Misconfiguration Leads to 0-Click ATOMedium
LogoHow I Earned $1800 for finding a (Business Logic) Account Takeover Vulnerability?Medium
LogoAccount (of the CEO) Takeover via Password ResetMedium
LogoAccount Takeover via Email ConfirmationMedium
LogoAccount Takeover via Weak OTPMedium
Logo[Account Take Over] through reset password token leaked in response, 2500 โ‚ฌ RewardMedium
Logo5 Ways to do ATO in a Single WebsiteMedium
LogoAccount takeover in cups.mail.ruMedium
LogoU.S. Dept Of Defense disclosed on HackerOne: Password Reset link...HackerOne
https://hackerone.com/reports/843160hackerone.com
LogoUPS VDP disclosed on HackerOne: Admin Authentication Bypass Lead to...HackerOne
LogoPII Leakage via IDOR + Weak PasswordReset = Full Account TakeoverMedium
Logo0 Click Account takeoverMedium
https://www.youtube.com/watch?v=EI52YTRfGRUwww.youtube.com
PreviousSub Domain TakeoverNextdependency confusion vulnerability

Last updated 2 months ago