Biscuit's Bug Bounty Playbook
CtrlK
  • ๐Ÿ‘‹Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • ๐ŸงพResume For Cyber Security Freshie
    • ๐Ÿ“—Browser extension For Bug Bounty
    • ๐Ÿ“€POC Videos YT Channel
    • ๐Ÿ“บ55 YouTube Channels To Learn Hacking
    • ๐Ÿ‘€Hackers to Follow on Social Media
      • Twitter
      • Medium
      • YouTube
      • GitHub
      • Discord Server
      • Security GitBooks
    • ๐Ÿ…Learn The Basics
      • ๐ŸŽ–๏ธType Of Cyber Security
      • ๐ŸฅˆCommon Job Roles
      • ๐Ÿฅ‰Get Started With InfoSec
      • โš•๏ธBest Bug Bounty Platform
      • ๐Ÿ—ž๏ธBest InfoSec Writeups Website
      • ๐ŸชHacking Books
      • ๐Ÿฅ‚CLI Commands
      • ๐Ÿ’ฟLearn WSL
    • ๐Ÿ‘ฉโ€๐Ÿ’ปFun Programming Codes
    • ๐Ÿ”ฎBuild your own Bug Bounty Methodology
    • ๐ŸŽดBug Bounty Checklist
    • ๐Ÿ˜ผJS Analysis for Bug Bounty
  • ๐ŸŸงLearn to Use Burp Suite
  • Learn Android Bug Bounty
    • ๐ŸŽฅVideo Tutorials
  • โค๏ธYouTube Channels
  • ๐Ÿ“ฐBug Bounty Reports
  • ๐Ÿ“šBlogs & Writeups
  • ๐ŸนGitHub Repository
  • ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งConference Talks
  • ๐Ÿ–จ๏ธAutomated Scanners
  • โš™๏ธIntentionally Vulnerable Apps
  • ๐ŸŽฑLearn Drozer For Android Pentesting
  • ๐Ÿช€Learn Frida For Android Pentesting
  • ๐ŸˆBypassing Security Protections in APKs via Objection and Frida
  • ๐ŸชSecurity Tools For Android Pentesting
  • ๐Ÿ˜ผPIDCAT for Android Bug Bounty Logging
  • ๐ŸŽนCLI Commands & Shortcuts
  • My Android Bug Bounty Lab Setup
  • Learn Thick Client Pentesting
    • ๐ŸŸฅIntroduction Videos
  • ๐Ÿ“‘Introduction Articles
  • โœ…Pentesting Checklist
  • ๐Ÿ“šBug Bounty Writeups
  • ๐ŸžThick Client Vulnerabilities
    • DLL Hijacking Basics
  • ๐ŸฅผIntentionally vulnerable labs
  • ๐Ÿ› ๏ธTools for Thick Client Pentesting
  • ๐Ÿ Bug Bounty Programs with Thick Client Scope
  • ๐Ÿ’ตPaid Udemy Course
  • Bug Bounty Reports & Articles
    • 0๏ธโƒฃIndex
    • 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)
      • ๐ŸšกSub Domain Takeover
      • ๐Ÿš Account Takeover
      • ๐ŸšŸdependency confusion vulnerability
    • 2๏ธโƒฃIDOR (Indirect Object Reference)
    • 3๏ธโƒฃLeaks & Disclosure (PII, API Key, etc)
    • 4๏ธโƒฃOpen Redirects
    • 5๏ธโƒฃRequest Forgery (CSRF & SSRF)
      • ๐ŸŸขCSRF
      • ๐Ÿ”ดSSRF
    • 6๏ธโƒฃInjections (HTML, XSS, etc)
      • ๐ŸŸกXSS
      • ๐ŸŸ HTML Injection
      • โšซSQL Injection
      • ๐ŸŸฃCR/LF Injection
      • ๐ŸŸขSSTI
      • ๐Ÿ”ดHost Header Injection
      • ๐Ÿ”ตCSV Injection
    • 7๏ธโƒฃBroken Access Control & Broken Authentication
      • โš™๏ธFile Upload Functionality
      • โš™๏ธPassword Reset Functionality
      • โš™๏ธ2FA Functionality
      • โš™๏ธOauth Functionality
      • โš™๏ธBypassing
      • โš™๏ธMisconfiguration
      • โš™๏ธCaptcha Bypass
      • โš™๏ธBusiness Logic Flow
    • 8๏ธโƒฃWeb Socket
    • 9๏ธโƒฃMiscellaneous Reports
    • ๐Ÿ”ŸIDN Homograph Attack
    • ๐ŸงปUser-Role Management Issue
    • 0๏ธCloud
      • ๐ŸŒฉ๏ธAWS S3
    • 1๏ธLow Hanging Fruits
    • 2๏ธCache Vulnerabilities
    • 3๏ธDOS/DDOS
  • 4๏ธForced Browsing
  • 5๏ธRCE
  • 6๏ธOSINT
  • Bug Bounty Platforms
    • ๐Ÿ›BugCrowd
    • ๐ŸžHackerOne
    • ๐ŸIntigriti
    • ๐ŸœOpen Bug Bounty
  • Exploiting Technologies
    • 0๏ธโƒฃIntroduction
    • 1๏ธโƒฃWordpress
    • 2๏ธโƒฃGraphQL API
    • 3๏ธโƒฃIDOR Vulnerability
Powered by GitBook
On this page
  1. Bug Bounty Reports & Articles
  2. 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)

๐Ÿš Account Takeover


Logo0-Click Account Takeover Earned Me โ‚ฌ900 BountyMedium
LogoOpen Redirect Validation Bypass Leads To Account Take Over (ATO)Medium
LogoFull Account Takeover Leading to RCE Remote Code ExecutionWaqas Zaka
LogoPre account takeoverMedium
LogoOauth Misconfiguration Leads to 0-Click ATOMedium
LogoHow I Earned $1800 for finding a (Business Logic) Account Takeover Vulnerability?Medium
LogoAccount (of the CEO) Takeover via Password ResetMedium
LogoAccount Takeover via Email ConfirmationMedium
LogoAccount Takeover via Weak OTPMedium
Logo[Account Take Over] through reset password token leaked in response, 2500 โ‚ฌ RewardMedium
Logo5 Ways to do ATO in a Single WebsiteMedium
LogoAccount takeover in cups.mail.ruMedium
LogoU.S. Dept Of Defense disclosed on HackerOne: Password Reset link...HackerOne
https://hackerone.com/reports/843160hackerone.com
LogoUPS VDP disclosed on HackerOne: Admin Authentication Bypass Lead to...HackerOne
LogoPII Leakage via IDOR + Weak PasswordReset = Full Account TakeoverMedium
Logo0 Click Account takeoverMedium
https://www.youtube.com/watch?v=EI52YTRfGRUwww.youtube.com
PreviousSub Domain TakeoverNextdependency confusion vulnerability

Last updated 1 month ago