<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Muhaddis</title>
    <description>The latest articles on DEV Community by Muhaddis (@muhaddimu).</description>
    <link>https://dev.to/muhaddimu</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F30519%2F2ba0de0f-c016-443d-a288-b51340730013.jpg</url>
      <title>DEV Community: Muhaddis</title>
      <link>https://dev.to/muhaddimu</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/muhaddimu"/>
    <language>en</language>
    <item>
      <title>Cross Site Scripting(XSS) in WhatsApp Web</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:42 +0000</pubDate>
      <link>https://dev.to/muhaddimu/cross-site-scripting-xss-in-whatsapp-web-4he6</link>
      <guid>https://dev.to/muhaddimu/cross-site-scripting-xss-in-whatsapp-web-4he6</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/4UPhXh-54u0"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From Recorded Future</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:39 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-recorded-future-lkk</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-recorded-future-lkk</guid>
      <description>&lt;p&gt;Cyber Security Rehearsing is going great. I cherish programming and afterwards the Vulnerabilities that stand because of the low level of Programming.&lt;/p&gt;

&lt;p&gt;Same Issue I have found on&lt;a href="https://www.recordedfuture.com/"&gt; Recorded Future's&lt;/a&gt; site. The defects I have found are &lt;strong&gt;Email Spoofing&lt;/strong&gt; and &lt;strong&gt;Clickjacking&lt;/strong&gt; and the site is responsible of their Security issues, I informed all of them and the following one day I got a thanks answer from them, In one week they settled this issue.&lt;/p&gt;

&lt;p&gt;They offer Acknowledgements to me furthermore included my name in their site's&lt;a href="https://www.recordedfuture.com/security/"&gt; Hall Of Fame&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;See below Proof of concept.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ioIm8g88--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/hkj9va4pl65rqxmwpxal.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ioIm8g88--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/hkj9va4pl65rqxmwpxal.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cyLI5Z4l--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/xwc9fysg40x8suyb9uwg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cyLI5Z4l--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/xwc9fysg40x8suyb9uwg.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks to&lt;a href="https://www.recordedfuture.com"&gt; Recorded Future&lt;/a&gt; for giving me Acknowledgement.&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From KNB</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:37 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-knb-49a8</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-knb-49a8</guid>
      <description>&lt;p&gt;In the wake of burning through many hours in Cyber Security Researching about I am presently ready to create some logical defects in Web Applications, before some days I was testing the site of &lt;a href="https://www.knb.nl"&gt;KNB&lt;/a&gt; I have established some basic and minor issues related with the security of their site.&lt;/p&gt;

&lt;p&gt;I have established &lt;strong&gt;Clickjacking&lt;/strong&gt;,** XSS (Cross-site scripting)** and some different issues related with their site.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--vL5ut9dI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/6ea7mlb02m7mf5s5yq1s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--vL5ut9dI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/6ea7mlb02m7mf5s5yq1s.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the wake of discovering Reflected base XSS in their site, I am able to change this Reflected XSS into Stored XSS and it would be significantly more Malicious. I also founded the issue of Missing DMARC records and other Clickjacking issues. After my reports to &lt;a href="https://www.knb.nl"&gt;KNB&lt;/a&gt; I receive a positive reply from the company.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FHg-8lRi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/lhjlum2rw19h5z809gh2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FHg-8lRi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/lhjlum2rw19h5z809gh2.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As indicated by their&lt;a href="https://www.knb.nl/english/responsible-disclosure"&gt; Responsible Disclosure&lt;/a&gt; they accepted my report and Acknowledged me. They additionally included my name in their website's &lt;a href="https://www.knb.nl/english/responsible-disclosure"&gt;Responsible Disclosure&lt;/a&gt;'s&lt;a href="https://www.knb.nl/responsible-disclosure-hall-of-fame"&gt; Hall of Fame&lt;/a&gt; page.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--nEZbndVL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/m8pdchz29cmr68obeexx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--nEZbndVL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/m8pdchz29cmr68obeexx.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I am appreciative to group KNB to accept these issues and attempt to fix them. Thank You!&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From Intel</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:35 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-intel-3jml</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-intel-3jml</guid>
      <description>&lt;p&gt;Before some days I have established a logical security issue in Intel's website however they have some different Responsible policy, they don't permit Researchers to do pen-testing without their authorization else they may take actions against it. So I contacted them and requested permission which they agreed and in a few days I reported them that issue and it got approved.&lt;/p&gt;

&lt;p&gt;After working on my report, in a few days, they Acknowledged me with the Certificate and the security team is working to resolve this issue.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--64lKNzF1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/yb4v23c8pkn3ikrlslml.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--64lKNzF1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/yb4v23c8pkn3ikrlslml.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/ZzQY55Jl6ns"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;Thankful for your valuable time.&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From Inflectra</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:33 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-inflectra-1f3o</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-inflectra-1f3o</guid>
      <description>&lt;p&gt;As &lt;strong&gt;Cross-Site Scripting&lt;/strong&gt; is one of my most loved imperfections I frequently test in web application and the greater part of the circumstances I got my outcome. Same issue I have recently found in&lt;a href="https://www.inflectra.com"&gt; Inflectra&lt;/a&gt;  with the assistance of one of my companions.&lt;/p&gt;

&lt;p&gt;Most of the time Cross-Site Scripting vulnerabilities exist in Forms, Search Results, Support and Forms fields. I have likewise established the Stored XSS in the Support&lt;a href="https://www.inflectra.com/Support/Forum/List.aspx"&gt; Help Center of Inflectra&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vulnerable Url:&lt;/strong&gt; &lt;a href="https://www.inflectra.com/Support/Forum/List.aspx"&gt;https://www.inflectra.com/Support/Forum/List.aspx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;User Agent:&lt;/strong&gt; Mozilla / Chrome / Safari / Android&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bug Type:&lt;/strong&gt; Stored XSS (Cross-Site Scripting)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fix:&lt;/strong&gt; Modify your input validation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Date:&lt;/strong&gt; 6th Feb - 17&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Current Status:&lt;/strong&gt; Patched&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steps To Produce:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Goto&lt;a href="https://www.inflectra.com/Support/Forums.aspx"&gt; https://www.inflectra.com/Support/Forums.aspx&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;In the Forms, field selects any Category and after that select any problem/question.&lt;/li&gt;
&lt;li&gt;Click on the Reply Button on that question and here select &lt;strong&gt;Insert Table&lt;/strong&gt; option.&lt;/li&gt;
&lt;li&gt;Insert&lt;a href="http://www.muhaddis.info/advanced-cross-site-scripting-xss-cheat-sheet/"&gt; XSS (Cross-Site Scripting) Payload&lt;/a&gt; in every single table field as appeared in the picture. Then click &lt;strong&gt;Insert Table.&lt;/strong&gt; Payload "&amp;gt;&amp;lt;img src=# onerror=alert('XSS') /&amp;gt; You'll see the popup executes and the page is powerless against XSS.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MSfUzlbi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/hxgwb90uj4ky34i2mh53.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MSfUzlbi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/hxgwb90uj4ky34i2mh53.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At that point as I &lt;strong&gt;Inserted Table&lt;/strong&gt; the code is executed and a popup shows up.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cKtaBCDM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/6d0kpbgxwp57ynkgd7m1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cKtaBCDM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/6d0kpbgxwp57ynkgd7m1.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As I got the outcomes I reported this Security blemish to them they answered me in five working days and began attempting to resolve this issue.&lt;/p&gt;

&lt;p&gt;They settled this issue in fifteen days and offered me to mention my name in their web site security  &lt;a href="https://www.inflectra.com/Company/Responsible-Disclosure.aspx"&gt;Hall of Fame&lt;/a&gt; page.&lt;/p&gt;

&lt;p&gt;I accepted their offer and in five more days I was on their&lt;a href="https://www.inflectra.com/Company/Responsible-Disclosure.aspx"&gt; Hall of Fame&lt;/a&gt; page.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pqMGzbVe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/fefm9knbneawsws3lvqd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pqMGzbVe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/fefm9knbneawsws3lvqd.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Much Obliged for taking your valuable time. Much Obliged Inflectra for acknowledgement. (:&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From BugCrowd</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:31 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-bugcrowd-2d6l</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-bugcrowd-2d6l</guid>
      <description>&lt;p&gt;Welcome here, Hunting before the examination is very fun when contrasted with typical days. Well, I was not in an inclination of bug chasing with full fixation yet all that happened surprisingly, Sound funny? I'm not joking. Each analyst has a fantasy to test security platforms like&lt;a href="https://www.hackerone.com/"&gt; HackerOne&lt;/a&gt; or&lt;a href="https://Bugcrowd.com"&gt; BugCrowd&lt;/a&gt; and so forth. These stages are effectively tried by many top security researchers so I don't think whether my security discoveries will be acknowledged or not. In support of a renowned axiom, hope is the key to success, I began testing one of the subdomains of a BugCrowd. Recently one of my companions discovered Cross-Site Scripting (XSS) vulnerability in the same area and he has been compensated with an extraordinary measure of Bug Bounty. My fortunes worked this time, so let's go how it starts.&lt;/p&gt;

&lt;p&gt;Bugcrowd is a vulnerability disclosure platform. It provides Bugcrowd Security Researchers with a secure platform to submit vulnerabilities to your team and allows you the ability to incentivize our researchers through. Bugcrowd points or monetary rewards&lt;/p&gt;

&lt;p&gt;On 2nd February 2017, I wished to make a Security group account on&lt;a href="https://tracker.bugcrowd.com/"&gt; CrowdControl&lt;/a&gt; to permit pen-testers to security test into my site directly in the wake of watching Cross-Site Scripting (XSS) video proof of concept on&lt;a href="https://tracker.bugcrowd.com/"&gt; CrowdControl&lt;/a&gt;. I did it all and as I swung to Logout but I wouldn't permit me to logout without testing that web as well.&lt;/p&gt;

&lt;p&gt;I configured my Burp-Suite and began testing, and in under five minutes I've established medium vulnerability, you can think of it as an Authentication issue, no it was not a session management flaw. At first, I thought to report it but it would be cooler if I tested the entire space. I wrote down the steps of replication and began chasing once more, and around five minutes I discovered the Information Disclosure issue, does it sound familiar? No, it was not a User/Email list through Signup.&lt;/p&gt;

&lt;p&gt;Indeed, with the these both Vulnerability combination, I'm now able to disclose sensitive data and information which including:&lt;/p&gt;

&lt;p&gt;I can read or reply reports&lt;br&gt;
I can read or reply reports&lt;br&gt;
Export all reports&lt;br&gt;
User / Email Enumeration&lt;br&gt;
User APIs (If activated)&lt;br&gt;
I can invite any member to join the team (Just in case if the owner is a victim)&lt;/p&gt;

&lt;p&gt;Much more sensitive data related to&lt;a href="https://tracker.bugcrowd.com/"&gt; CrowdControl&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;By chaining both vulnerabilities and reporting that Vulnerability chain which leads to sensitive information disclosure and in the next five days they answered that they require some more information identified with that defect and it will be great if I give them a video demonstration of vulnerability.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--B8o7TMKN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/fpbudip3q9ghl4vma821.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--B8o7TMKN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/fpbudip3q9ghl4vma821.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I gave them video evidence of the idea and in the next fifteen days, they changed the report status to triaged and stamp it as P3 (third level need scope).&lt;/p&gt;

&lt;p&gt;In the next twelve days, the report status changed to resolved from triage and they acknowledged me by issuing my name in their&lt;a href="https://bugcrowd.com/bugcrowd/hall-of-fame"&gt; Hall of fame&lt;/a&gt;. Furthermore, the issue is not reproducible any longer from my side.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--EQsH3P_g--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jnpd3ke7pejblqumga12.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--EQsH3P_g--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jnpd3ke7pejblqumga12.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Furthermore, they remunerated me with a reward measure of 600$ abundance and that was my incredible accomplishment.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--D_QyTacM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/mw4xoym8uy0vvvcab3tc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D_QyTacM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/mw4xoym8uy0vvvcab3tc.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--smnYHRRY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/tvrd7equyhnhtzjezlfu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--smnYHRRY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/tvrd7equyhnhtzjezlfu.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Why Bonus Bounty? According to the&lt;a href="https://bugcrowd.com/bugcrowd"&gt; BugCrowd&lt;/a&gt; security policy &lt;a href="https://tracker.bugcrowd.com/"&gt;CrowdControl&lt;/a&gt; is built on Ruby on Rails and they compensate a researcher 3X then their ordinary reward, and their beginning price is 200$.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--0UAWgnvN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ej7115kv1afx6domxu64.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--0UAWgnvN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ej7115kv1afx6domxu64.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Timeline&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Report Submitted on 2nd February 2017 \&lt;br&gt;
They asked for a video demonstration on 7th February 2017 \&lt;br&gt;
Provided proof of Concept on 10th February 2017 \&lt;br&gt;
I recall them about the report on 24th February 2017 \&lt;br&gt;
They changed state to triaged and P3 on 24th February 2017 \&lt;br&gt;
They resolved the report and added a 600$ reward on 8th March 2017 \&lt;br&gt;
I received bug bounty on 12th March 2017 \&lt;br&gt;
They sent me that bug bounty to my&lt;a href="https://share.payoneer.com/nav/rxDVRKtJnCLCfmdUuWmSNIhPgWogoPPbasJ_PVms1tPX213v5NgdUB2jnn5MTRS1QQ7n07eYAsXuuRKTPoNDFA2"&gt; Payoneer’s&lt;/a&gt;&lt;span&gt; &lt;/span&gt;account.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zK1MdU81--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/2np7wahiy9t5balui7go.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zK1MdU81--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/2np7wahiy9t5balui7go.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As indicated by the disclosure policy of&lt;a href="https://bugcrowd.com/bugcrowd"&gt; BugCrowd&lt;/a&gt; I can't uncover that bug with complete proof of, yet I trust you comprehend the outline of that Vulnerability.&lt;/p&gt;

&lt;p&gt;I am appreciative to BugCrowd for reward and acknowledged my endeavours and time. I am likewise appreciative to you for your profitable time. If you have any proposals or any perplexities identified with this article don't hesitate to remark down. Stay tuned, keep smiling :-)&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From Jet</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:28 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-jet-303i</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-jet-303i</guid>
      <description>&lt;p&gt;On third March 2017, I visited&lt;a href="http://Jet.com"&gt; Jet.Com&lt;/a&gt; and by investing a modest measure of energy I discovered a famous vulnerability in their site. It was considered as a Cookie Replay issue that leads to lifetime access of the victim's account. In case you're a security analyst or a bug researcher I generally exhort you to invest as much time in chasing as much you can, and that I learnt from one of my Indian friends.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Steps to Replication&lt;/strong&gt;:
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Goto&lt;a href="https://jet.com/account/"&gt; Jet's Account&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Login to Your Account&lt;/li&gt;
&lt;li&gt;Get the Cookies using " Burp Suite" or "EditThisCookie" or (AnyBrowser's Extension) Copy All These Cookies.&lt;/li&gt;
&lt;li&gt;Logout from the Account&lt;/li&gt;
&lt;li&gt;Clear All the Cookies of your Browser related with&lt;a href="https://jet.com/account/"&gt; Jet's Account&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Save the Cookies you Copied in a Text File&lt;/li&gt;
&lt;li&gt;Now Inject/Import Old Cookies to the&lt;a href="https://jet.com/account/"&gt; Jet's Account&lt;/a&gt; by "EditThisCookie" (Google Extension)&lt;/li&gt;
&lt;li&gt;As you can see, You will be again logged In to&lt;a href="https://jet.com/account/"&gt; Jet's Account&lt;/a&gt; Account using old Session Cookies.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;After identifying that report they changed the to triaged and I’m glad to get another bounty, but then they revoked and I was like :|&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--QgC5ajZC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/rozkiljadwgymzacxlao.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--QgC5ajZC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/rozkiljadwgymzacxlao.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Following two days the report status changed to duplicate and resolved.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pZyMjYzJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/a8kplntd9dpe81sytaqs.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pZyMjYzJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/a8kplntd9dpe81sytaqs.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;They recognized me by including my name in their Security researcher&lt;a href="https://bugcrowd.com/jet/hall-of-fame"&gt; Hall of fame&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--wRgE4qPl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/3okh6yvw8wo3j7mxuf03.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--wRgE4qPl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/3okh6yvw8wo3j7mxuf03.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I'll test that site again as I got some time and I'll do my best to locate another interesting vulnerability. I thank Jet for acknowledgement and my thanks to you too for your profitable time.&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From Hubspot</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:26 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-hubspot-47e9</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-hubspot-47e9</guid>
      <description>&lt;p&gt;This website has web-based advertising online tools which minimizes our work to such an extent. They have likewise an&lt;a href="https://www.hubspot.com/email-signature-generator"&gt; Email Signature maker&lt;/a&gt; which is vulnerable to Cross-Site Scripting (XSS). My companion proposed to me HubSpot Academy for finding out about Email Marketing tutorials. I have investigated their site and established that this Email Signature is vulnerable to Cross-Site Scripting (XSS) vulnerability. In spite of the fact that they additionally have a Responsible Disclosure program on BugCrowd however, I never noticed.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Below I'll show you I replicate Cross-Site Scripting (XSS) in HubSpot&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Go to&lt;a href="https://www.hubspot.com/email-signature-generator"&gt; HubSpot&lt;/a&gt; Email Signature maker.&lt;/p&gt;

&lt;p&gt;In the Email Signature required data frame, fill these fields with XSS payloads. This page is reacting invigoratingly to the ideal frame.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pH5ke2YC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/6qlwjhxv9dilndm9m3tz.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pH5ke2YC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/6qlwjhxv9dilndm9m3tz.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As page loads entered information, the JavaScript payload executed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--85q9T-xl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/i0e0zfpzxf6ck225l9gs.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--85q9T-xl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/i0e0zfpzxf6ck225l9gs.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The following day they replied:&lt;br&gt;
&lt;em&gt;This submission has been previously reported by another researcher. Thanks for the submission, this submission is duplicate of another submission. We appreciate your effort and we hope that you’ll continue to research and submit any future security issues you find.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;After confirming that report they Acknowledged me by posting my name in HubSpot Hall of Security Researcher &lt;a href="https://bugcrowd.com/hubspot/hall-of-fame"&gt;HubSpot Hall of Fame&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--qQW6nLjU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/f1uhb84y9es1pdimpa6r.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--qQW6nLjU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/f1uhb84y9es1pdimpa6r.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I am grateful to HubSpot for acknowledging and  I’ll test that site again as I got some time and I’ll do my best to locate another interesting vulnerability. I thank HubSpot for acknowledgement and my thanks to you too for your profitable time.&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From MAGIX</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:24 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-magix-kg0</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-magix-kg0</guid>
      <description>&lt;p&gt;Welcome everybody, this is Muhaddis and today I am sharing one of my recent discoveries in&lt;a href="http://magix.com"&gt; MAGIX Inc&lt;/a&gt;. Magix Software GmbH is the largest subsidiary of Bellevue Investments. Its managing director is Klaus Schmidt. The company is an international software publisher with a focus on multimedia software and services and is headquartered in Berlin.&lt;/p&gt;

&lt;p&gt;As I wanted to be featured in their security researchers Hall of Fame and my fortunes go with me this time moreover. As they have an exceptionally immense web scope that opens entryways for me to upgrade my skills and make my position in the Hall of Fame. Before beginning pentesting I approached their responsible disclosure policy and quickly investigated the security researchers zone.&lt;/p&gt;

&lt;p&gt;In the Hall of Fame a couple of researchers reported about Magix.Info it's one of MAGIX sub-associations. I began pentesting and in the meantime, I established three security vulnerabilities in&lt;a href="http://Magix.Info"&gt; Magix.Info&lt;/a&gt; and was feeling fantastic from inside.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;a href="https://youtu.be/gpx5ReL5ric"&gt;Stored Cross Site Scripting (XSS)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://youtu.be/WWxLuvysI4U"&gt;Open Redirection Leads To Cross Site Scripting&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  Broken Authentication and Sessions Management Flaw&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/gpx5ReL5ric"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/WWxLuvysI4U"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;At first, I requested authorization to test their site incorporating sub-areas and in a couple of hours, I get a positive response from their specialized technical staff that I am permitted to do as such.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6zKq7IoR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/dp0hkrbf4b0c01mrerkm.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6zKq7IoR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/dp0hkrbf4b0c01mrerkm.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Without sitting around idly I composed an itemized write about it and sent them to their responsible security team.&lt;/p&gt;

&lt;p&gt;Four months I have been pinging them about updates about that issue and their web domains are as yet vulnerable however I didn't get any response from them. I mailed them again asking for updates and they answered, &lt;em&gt;Sorry, but you may have to be a little more specific about which problem you reported. Can you provide the date/time and/or subject line of your original report email? I just went back in my mails, had a look and could only find a previous request from you for us to give permission for some security testing, which we did. I couldn't find any actual report yet. Thanks.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---3ZLDUzJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/udumjzcelty9rwidoybo.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---3ZLDUzJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/udumjzcelty9rwidoybo.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I resent that old reported mail to them and following three days I got mail that, &lt;em&gt;Thanks for your feedback and the contribution to the security of our website. We have forwarded this matter to our colleagues at website development and administration for their attention. They will evaluate the situation and take the necessary steps. We will be standing by for their feedback and keep you posted.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;In this interim, I sat tight more two months for it and on August 22 I got a response that,&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--I6V08krF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/frzvx5hsbo3gjhj9p0dh.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--I6V08krF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/frzvx5hsbo3gjhj9p0dh.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I was glad to contribute and expressed gratitude toward my patience. Further, they acknowledged me by adding my name on the top of their security researchers&lt;a href="http://research.magix.com"&gt; hall of fame&lt;/a&gt; (A nine days wonder).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_eEKEuSj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/m07c6vkb80q6du3ged7h.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_eEKEuSj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/m07c6vkb80q6du3ged7h.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I am grateful to MAGIX for acknowledging and. I thank MAGIX for acknowledgement and I thanks to you too for your profitable time reading this article.&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From Unsplash</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:22 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-unsplash-40ae</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-unsplash-40ae</guid>
      <description>&lt;p&gt;Who don't love complimentary gifts regardless of how much cash you have? One advantage for me after getting involved in Bug Bounties is I love particular organization Shirts, Swags and stickers and now I have a bunch of collections. I frequently called myself freebies hunter rather than Bug Bounty Hunter :P&lt;/p&gt;

&lt;p&gt;Well in my social circles a person posted a photo of his lid back with a stuck couple of stickers and unsplash stickers was additionally a piece of that accumulation. I went to their site and found that it's a website dedicated to sharing copyright-free photography under the Unsplash license. I founded the best room for me. I established the best space for me.&lt;/p&gt;

&lt;p&gt;At the time I don't know whether they have a responsible disclosure policy or not. Without sitting idle and looking for any security policy page, I registered myself here and began pentesting not for bounty hunting but for bug freebies reward hunting. I know it sounds unfathomably horrendous. After searching and looking into pages I discovered a&lt;a href="https://unsplash.com/security"&gt; security&lt;/a&gt; and it initiates my inner monster of Bug Hunting, just joking.&lt;/p&gt;

&lt;p&gt;I was searching for security-related issues, I experienced their API documentation and discovered many intriguing things here.&lt;/p&gt;

&lt;p&gt;In a couple of hours, I established three security vulnerabilities in their Web Application and one in their APIs which can disclose private and delicate data.&lt;/p&gt;

&lt;p&gt;I reported these security vulnerabilities to their security team with detail explained and got responses from them in the next couple of hours.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xNxk-xIK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/vy7q8ticsxkqzxw18iy9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xNxk-xIK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/vy7q8ticsxkqzxw18iy9.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Because of their security policy, I can't uncover finished bug reports with Proof of Concept. After addressing these security discoveries, Unsplash Co-founder &amp;amp; CPO recommended me on &lt;a href="http://linkedin.com/in/MuhaddiMu"&gt;LinkedIn.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--HtlS2fHo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/h9jrjlxpxfmdmd7mxozl.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--HtlS2fHo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/h9jrjlxpxfmdmd7mxozl.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;They will be adding me in their&lt;a href="https://unsplash.com/security"&gt; security&lt;/a&gt; page soon. It was truly a good experience with Unsplash and I truly appreciate their support team. A debt of gratitude is in order for pursuing. Keep in contact to pursue more nitty-gritty reviews on bug bounty and more identified with InfoSec.&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From AlienVault</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:20 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-alienvault-259l</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-alienvault-259l</guid>
      <description>&lt;p&gt;AlientVault has a&lt;a href="https://www.alienvault.com/documentation/usm-appliance/kb/2016/03/how-to-submit-a-security-issue-to-alienvault.htm"&gt; responsible disclosure policy&lt;/a&gt; so I experienced it and wanted to test their web application related to security vulnerabilities. I was a  little occupied nowadays so I scarcely managed time and began testing their web applications and just engaged with their primary domain. As few of my different companions got recognized from AlienVault and I also wished to don't miss that open door.&lt;/p&gt;

&lt;p&gt;After doing a security test I established a couple of vulnerabilities in the meantime and reported it to the security support team without wasting time and get their response in ten days. &lt;em&gt;Thank you for sharing your findings. We have just issued a security-test on this domain, so we will take this into considerations while performing the research.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Following a couple of more days, I approached them for updates and they replied, &lt;em&gt;Thank you for contributing in AlienVault's responsible security disclosure process.&lt;/em&gt; Please accept that certificate of appreciation as an honour.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rEPgpYg4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/bz431f66j51ldkrmkq91.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rEPgpYg4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/bz431f66j51ldkrmkq91.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;On October 30th, 2017 AlienVault launched a program on&lt;a href="https://hackerone.com/alienvault_security/"&gt; HackerOne&lt;/a&gt;. I reported the same issue to AlienVault through HackerOne and in the next couple of days they marked this report as resolved by following the issue utilizing HackerOne. I got listed in AlienVault's security researchers&lt;a href="https://hackerone.com/alienvault_security/thanks/2017"&gt; Hall of fame&lt;/a&gt; as HackerOne policy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pDReUxAM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/soylxarp6opyjnuwgms7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pDReUxAM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/soylxarp6opyjnuwgms7.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It's not finished by any stretch of the imagination, because it is minimally occupied nowadays and so I was unable to test their web application completely. I will require some time and will retry an infiltration testing to chase some more and high :D&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Acknowledgement From Adobe</title>
      <dc:creator>Muhaddis</dc:creator>
      <pubDate>Mon, 03 Aug 2020 15:48:18 +0000</pubDate>
      <link>https://dev.to/muhaddimu/acknowledgement-from-adobe-38h8</link>
      <guid>https://dev.to/muhaddimu/acknowledgement-from-adobe-38h8</guid>
      <description>&lt;p&gt;I generally wanted to test their security and wanted to be a piece of authority Adobe security researchers. This time &lt;a href="http://hackerone.com"&gt;HackerOne&lt;/a&gt; provided me with a chance to do as such. The Adobe security administration group keeps running on&lt;a href="https://hackerone.com/adobe"&gt; HackerOne&lt;/a&gt; HackerOne  HackerOne and I wanted to test their web application. Adobe has the most tremendous scope as indicated by HackerOne and it has settled circuitous more than one thousand or more reports&lt;/p&gt;

&lt;p&gt;On 24th August 2016, I reported security vulnerability to Adobe related with SPF and DMARC records which may lead to Email address spoofing. This one is the same as I established in Magento.&lt;/p&gt;

&lt;p&gt;After three days their security team members marked that report as triaged.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--55LQi8GL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/dhzmlb6guhbpczyzbshy.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--55LQi8GL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/dhzmlb6guhbpczyzbshy.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That was a good minute for me, I was truly cheerful on the grounds because that was my first report that got triaged in HackerOne. But after that who knows they took as much time to resolve, &lt;em&gt;Be patience, my patience.&lt;/em&gt; I got some information about updates after a month that they are still working on it and inform me once it gets fixed. Affirm! It took over more than five months now however they didn't respond about any updates or inquiries. One day all of a sudden I opened my HackerOne account and investigated my triaged reports. This one is the special case that keeps going so long. I retried to test it and what I established is that it is not predictable from my side. I pinged them once again and requested updates. Following one day they marked it as resolved because it is not producible anymore&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Er34pwIV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/6nsy4l381ws327m660wt.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Er34pwIV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/6nsy4l381ws327m660wt.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As per HackerOne policy, researchers are automatically featured in the team hall of fame if reports get resolved. I got recorded in  &lt;a href="https://hackerone.com/adobe/thanks"&gt;Adobe's Hall of Fame&lt;/a&gt; and that was my great experience.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--UiJAsdLq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/k7pank2ci5wfjyhcyqi1.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--UiJAsdLq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/k7pank2ci5wfjyhcyqi1.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I would like to Thank adobe security team and I would also like to thank you for your precious time. If you have any questions or suggestions then please use the comment form below and let me know. I always appreciate your comments and suggestions.&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>bughunting</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
