Bug Bounty Checklist
Last updated
Last updated
Build your own Bug Bounty Check List or scroll down and check mine mostly inspired by these resources only.
Grab PDF format:
1st Scenario
2nd scenario
4th Scenario Host-Header Injection in Oauthh
https://hackerone.com/reports/317476
Exploiting callback_urls= parameter
https://www.linkedin.com/pulse/account-takeover-via-google-oauth-misconfiguration-izyits-e76ef/?trackingId=8AI%2FWBa3TECMDxldWaTWSw%3D%3D
set value to true (https://cysky0x1.medium.com/registration-captcha-bypass-ecdb6cd382d1)
set captcha value to 1 and also set new content-length
Send old captcha value.
Send old captcha value with old session ID.
Request captcha absolute path like www.url.com/captcha/1.png
Change from POST to GET
Remove captcha parameter
Keep adding zero or country code before actual phone number eg 0XXXXXXXXXX, 00XXXXXXXXXX, 000XXXXXXXXXX, +91XXXXXXXXXX
let the intruder run till correct OTP even if there is 401 or 429 status code reference: https://mokhansec.medium.com/the-2-200-ato-most-bug-hunters-overlooked-by-closing-intruder-too-soon-505f21d56732
if OTP in json format try make it array
Response manipulation / false to true / correct OTP response.
check developer tools
Generate two OTP one from victim account second is attacker account Reference: https://strangerwhite.medium.com/bypassing-otp-verification-another-bug-found-without-any-tools-8b2c1013c3e7
With null or 000000
2FA Code Reusability
2FA Bypass through Oauth
Lack of Brute-Force Protection
2FA Code Leakage in Response
Missing 2FA Code Integrity Validation
Response Manipulation / Status Code Manipulation
2FA bypass with password reset functionality. https://www.linkedin.com/posts/alsanosi_bugbounty-hackerone-bugcrowd-activity-7313613977844908033-VBFJ?utm_source=share&utm_medium=member_desktop&rcm=ACoAAD7i-kYBPFLRnBLZy31myo6GBKvOJ3sZqKI
https://scr1pty.medium.com/how-i-found-xss-in-swagger-ui-leading-to-account-takeover-on-bug-bounty-8d419c6b95d5
https://infosecwriteups.com/hacking-swagger-ui-101-ccbce66ba028
https://github.com/Raunaksplanet/CustomPayloads-Wordlist.com/blob/main/Fuzz-Wordpress.tx
https://github.com/Raunaksplanet/CustomPayloads-Wordlist.com/blob/main/wp-content.txt
1st scenario
Change account details (Name, Number, Address, etc.) Try CSRF
EXIF Geolocation Data Not Stripped From Uploaded Images.
Rate limit on creating account
Try to register with company mail
Parameter Pollution eg https://www.linkedin.com/feed/update/urn:li:activity:7299260730627756032/
if email verification on registration then try HTMLI & Hyperlink injection
Check for insufficient email verification process and enable 2FA for account takeover
Long password (>10k char) leads to DoS)
Weak registration implementation-Allows disposable email addresses
try id@ in registration page (reference: https://medium.com/@iski/how-i-found-my-first-high-severity-bug-and-got-rewarded-with-3-trays-of-red-bull-29ec0ca6a2e4)
If JSON request, add comma {โemailโ:โvictim@mail.comโ,โhacker@mail.comโ,โtokenโ:โxxxxxxxxxxโ}
try to register with company email.
login rate limit bypass
response manipulations
directory bruteforce
XSS on any other parameters found
try adding magic bytes eg: https://www.youtube.com/watch?v=oUI38IEqimM
Unrestricted File Upload via Double Extension Bypass
Unauthenticated Image Upload to Public Cloud Storage
Bypass of Product Image Upload Limit
No Rate Limiting or Upload Quotas
File Replacement Attack
1st Scenario
2nd scenario
3rd scenario
https://www.linkedin.com/posts/rohith-s-0b9b2b267_bugbounty-bugbountyreports-bugbountyjourney-activity-7318306351510683648-7Qug?utm_source=share&utm_medium=member_desktop&rcm=ACoAAD7i-kYBPFLRnBLZy31myo6GBKvOJ3sZqKI
Bypass rate limiting by tampering user agent to Mobile User agent
Bypass rate limiting by using null byte
Check IDOR
Lack of password confirmation when deleting your account
Buy Now
Tamper product ID to purchase other high valued product with low prize
Tamper product data in order to increase the number of product with the same prize
Gift/Voucher
Tamper gift/voucher count in the request (if any) to increase/decrease the number of vouchers/gifts to be used
Tamper gift/voucher value to increase/decrease the value of the voucher in terms of money. (e.g. $100 is given as a voucher, tamper value to increase, decrease money)
Reuse gift/voucher by using old gift values in parameter tampering
Check the uniqueness of gift/voucher parameter and try guessing other gift/voucher code
Use parameter pollution technique to add the same voucher twice by adding same parameter name and value again with & in the BurpSuite request
Add/Delete Product from Cart
Tamper user id to delete products from other user's cart
Tamper cart id to add/delete products from other user's cart
Identify cart id/user id for cart feature to view the added items from other user's account
Place Order
Tamper payment options parameter to change the payment method. E.g. Consider some items cannot be ordered for cash on delivery but tampering request parameters from debit/credit/PayPal/net banking option to cash on delivery may allow you to place order for that particular item
Tamper the amount value for payment manipulation in each main and sub requests and responses
Check if CVV is going in cleartext or not
Check if the application itself processes your card details and then performs a transaction or it calls any third-party payment processing company to perform a transaction
Track Order
Track other user's order by guessing order tracking number
Brute force tracking number prefix or suffix to track mass orders for other users
Wish list page testing
Check if a user A can add/remote products in Wishlist of other user Bโs account
Check if a user A can add products into user Bโs cart from his/her (user Aโs) Wishlist section.
Post product purchase testing
Check if user A can cancel orders for user Bโs purchase
Check if user A can view/check orders already placed by user B
Check if user A can modify the shipping address of placed order by user B
Out of band testing
Can user order product which is out of stock?
Invite User as Different roles (Privilege escalation)
invite two user one as admin(user A) second as normal(user B) and then change user B email to user A Eg https://siratsami71.medium.com/from-user-to-admin-a-privilege-escalation-via-business-logic-7ae901be7d81
https://cysky0x1.medium.com/how-i-found-a-critical-bug-affecting-the-organization-and-changed-money-in-the-credit-balance-b92569df5352
1st scenario
2nd scenario
3rd scenario
check if backend check email case sensitivity
IDOR in reset link
Append second email parameter and value
Account lockout even after entering right password
CSRF on update password
Check if forget password reset link/code uniqueness
Password reset link not expiring using same link for multiple password reset
Token leak in referrer header while clicking to another link on new password page
https://github.com/0xmaximus/Galaxy-Bugbounty-Checklist/tree/main/Reset%20Password%20vulnerabilities
FOFA: domain="" && (icon_hash="1120729672" || icon_hash="-1128940573" || icon_hash="-1180440057")