๐ŸŽดBug Bounty Checklist


My Bug Bounty Check Check List


Functionality

Oauth

  • 1st Scenario

  • 2nd scenario

  • 4th Scenario Host-Header Injection in Oauthh

    • https://hackerone.com/reports/317476

  • Exploiting callback_urls= parameter

    • https://www.linkedin.com/pulse/account-takeover-via-google-oauth-misconfiguration-izyits-e76ef/?trackingId=8AI%2FWBa3TECMDxldWaTWSw%3D%3D


CAPTCHA

  • set value to true (https://cysky0x1.medium.com/registration-captcha-bypass-ecdb6cd382d1)

  • set captcha value to 1 and also set new content-length

  • Send old captcha value.

  • Send old captcha value with old session ID.

  • Request captcha absolute path like www.url.com/captcha/1.png

  • Change from POST to GET

  • Remove captcha parameter


OTP System

  • Keep adding zero or country code before actual phone number eg 0XXXXXXXXXX, 00XXXXXXXXXX, 000XXXXXXXXXX, +91XXXXXXXXXX

  • let the intruder run till correct OTP even if there is 401 or 429 status code reference: https://mokhansec.medium.com/the-2-200-ato-most-bug-hunters-overlooked-by-closing-intruder-too-soon-505f21d56732

  • if OTP in json format try make it array

  • Response manipulation / false to true / correct OTP response.

  • check developer tools

  • Generate two OTP one from victim account second is attacker account Reference: https://strangerwhite.medium.com/bypassing-otp-verification-another-bug-found-without-any-tools-8b2c1013c3e7


2FA Misconfiguration

  • With null or 000000

  • 2FA Code Reusability

  • 2FA Bypass through Oauth

  • Lack of Brute-Force Protection

  • 2FA Code Leakage in Response

  • Missing 2FA Code Integrity Validation

  • Response Manipulation / Status Code Manipulation

  • 2FA bypass with password reset functionality. https://www.linkedin.com/posts/alsanosi_bugbounty-hackerone-bugcrowd-activity-7313613977844908033-VBFJ?utm_source=share&utm_medium=member_desktop&rcm=ACoAAD7i-kYBPFLRnBLZy31myo6GBKvOJ3sZqKI


Swagger UI

  • https://scr1pty.medium.com/how-i-found-xss-in-swagger-ui-leading-to-account-takeover-on-bug-bounty-8d419c6b95d5

  • https://infosecwriteups.com/hacking-swagger-ui-101-ccbce66ba028

  • FOFA: domain="http://redacted.com" && (icon_hash="1120729672" || icon_hash="-1128940573" || icon_hash="-1180440057")


DMARC Policy


WordPress

https://github.com/Raunaksplanet/CustomPayloads-Wordlist.com/blob/main/Fuzz-Wordpress.tx

https://github.com/Raunaksplanet/CustomPayloads-Wordlist.com/blob/main/wp-content.txt


My Profile Testing

  • 1st scenario

  • Change account details (Name, Number, Address, etc.) Try CSRF

  • EXIF Geolocation Data Not Stripped From Uploaded Images.


Signup Form testing

  • Rate limit on creating account

  • Try to register with company mail

  • Parameter Pollution eg https://www.linkedin.com/feed/update/urn:li:activity:7299260730627756032/

  • if email verification on registration then try HTMLI & Hyperlink injection

  • Check for insufficient email verification process and enable 2FA for account takeover

  • Long password (>10k char) leads to DoS)

  • Weak registration implementation-Allows disposable email addresses

  • try id@ in registration page (reference: https://medium.com/@iski/how-i-found-my-first-high-severity-bug-and-got-rewarded-with-3-trays-of-red-bull-29ec0ca6a2e4)

  • If JSON request, add comma {โ€œemailโ€:โ€œvictim@mail.comโ€,โ€hacker@mail.comโ€,โ€œtokenโ€:โ€xxxxxxxxxxโ€}

  • try to register with company email.


Signin Form testing

  • login rate limit bypass

  • response manipulations

  • directory bruteforce

  • XSS on any other parameters found


File Upload

  1. try adding magic bytes eg: https://www.youtube.com/watch?v=oUI38IEqimM

  2. Unrestricted File Upload via Double Extension Bypass

  3. Unauthenticated Image Upload to Public Cloud Storage

  4. Bypass of Product Image Upload Limit

  5. No Rate Limiting or Upload Quotas

  6. File Replacement Attack


Session Issue

1st Scenario

2nd scenario

3rd scenario

https://www.linkedin.com/posts/rohith-s-0b9b2b267_bugbounty-bugbountyreports-bugbountyjourney-activity-7318306351510683648-7Qug?utm_source=share&utm_medium=member_desktop&rcm=ACoAAD7i-kYBPFLRnBLZy31myo6GBKvOJ3sZqKI


Test user account lockout mechanism on brute force attack

  • Bypass rate limiting by tampering user agent to Mobile User agent

  • Bypass rate limiting by using null byte


Account Deletion testing

  • Check IDOR

  • Lack of password confirmation when deleting your account


Product Purchase Testing

  • Buy Now

    • Tamper product ID to purchase other high valued product with low prize

    • Tamper product data in order to increase the number of product with the same prize

  • Gift/Voucher

    • Tamper gift/voucher count in the request (if any) to increase/decrease the number of vouchers/gifts to be used

    • Tamper gift/voucher value to increase/decrease the value of the voucher in terms of money. (e.g. $100 is given as a voucher, tamper value to increase, decrease money)

    • Reuse gift/voucher by using old gift values in parameter tampering

    • Check the uniqueness of gift/voucher parameter and try guessing other gift/voucher code

    • Use parameter pollution technique to add the same voucher twice by adding same parameter name and value again with & in the BurpSuite request

  • Add/Delete Product from Cart

    • Tamper user id to delete products from other user's cart

    • Tamper cart id to add/delete products from other user's cart

    • Identify cart id/user id for cart feature to view the added items from other user's account

  • Place Order

    • Tamper payment options parameter to change the payment method. E.g. Consider some items cannot be ordered for cash on delivery but tampering request parameters from debit/credit/PayPal/net banking option to cash on delivery may allow you to place order for that particular item

    • Tamper the amount value for payment manipulation in each main and sub requests and responses

    • Check if CVV is going in cleartext or not

    • Check if the application itself processes your card details and then performs a transaction or it calls any third-party payment processing company to perform a transaction

  • Track Order

    • Track other user's order by guessing order tracking number

    • Brute force tracking number prefix or suffix to track mass orders for other users

  • Wish list page testing

    • Check if a user A can add/remote products in Wishlist of other user Bโ€™s account

    • Check if a user A can add products into user Bโ€™s cart from his/her (user Aโ€™s) Wishlist section.

  • Post product purchase testing

    • Check if user A can cancel orders for user Bโ€™s purchase

    • Check if user A can view/check orders already placed by user B

    • Check if user A can modify the shipping address of placed order by user B

  • Out of band testing

    • Can user order product which is out of stock?

  • Invite User as Different roles (Privilege escalation)

    • invite two user one as admin(user A) second as normal(user B) and then change user B email to user A Eg https://siratsami71.medium.com/from-user-to-admin-a-privilege-escalation-via-business-logic-7ae901be7d81


Functionality where user get credit on account creation

  • https://cysky0x1.medium.com/how-i-found-a-critical-bug-affecting-the-organization-and-changed-money-in-the-credit-balance-b92569df5352


Password update & password forgot testing

  • 1st scenario

  • 2nd scenario

  • 3rd scenario

  • check if backend check email case sensitivity

  • IDOR in reset link

  • Append second email parameter and value

  • Account lockout even after entering right password

  • CSRF on update password

  • Check if forget password reset link/code uniqueness

  • Password reset link not expiring using same link for multiple password reset

  • Token leak in referrer header while clicking to another link on new password page

  • https://github.com/0xmaximus/Galaxy-Bugbounty-Checklist/tree/main/Reset%20Password%20vulnerabilities

Last updated