30 Days Of 120 Days High Frequency Hacking

2 minute read

Just 30 Days Folks

This small read will act as a “checking in” of 120 Days of frequent hacking. Therefore, these are some of the findings found among rejected reports due to low impact vulnerabilities, duplicates, accepted reports, and patch verifications. Feel free to request a write-up from some of the issues explained down below.

After starting a persistence practice along with Kuldeep, it’s been quite a journey to try to find vulnerabilities frequently at least on my side, but it’s doable along you share targets and doubts with teammates such as Kuldeep where I’ve gotten to learn about different attack vectors and also exploitation towards DOM XSS issues and SQL injections as well.

All vulnerabiltie, patches and missions were submitted in Synack Red Team Platform.

Kuldeep’s Finds

The way how Kuldeep’s mind works regarding hacking is straightforward, where he tends to spend his time mostly finding a medium to critical security issues and share curious attack vectors yet to try among different targets. If you want to get in touch with Kuldeep, don’t forget to give him a follow and shoot a DM for questions. Here are some of his findings with bounty amount:

Vulnerabilities, Patches, and Missions Status Resolved
Broken Access Control Disclosing PII Data Accepted $444.50
Misconfigured Web Server Leaks Admin Functionalities In 302 Response Body Accepted $533.40
Unauthenticated SQL Injection Accepted $9,903
Debugging Flag Disclosing Database Credentials Accepted $160
Debugging Flag Disclosing Database Credentials (Extra Endpoints) Accepted $40
Debugging Flag Disclosing Database Credentials (Extra Endpoints) Accepted $80
Time Based SQL Injection Rejected Duplicate
[Mission] Application Misuse Defences Accepted $50
[Mission] Web Server And Application Enumeration And Fingerprinting Accepted $50
[Mission] OS Command Injection Accepted $50
[Patch Verification] Broken Access Control Disclosing PII Data Accepted $100
[Patch Verification] Misconfigured Web Server Leaks Admin Functionalities In 302 Response Body Accepted $100
[Patch Verification] Unauthenticated SQL Injection Accepted $50
[Patch Verification] Joomla Configuration File Disclosure Accepted $50
[Patch Verification] Public Gitlab Instance Leaking Sensitive Information Accepted $100

Total Earned: $11,710.90

Sam’s Finds

During the past month, I’ve tried to spent at least 2 to 6 hours hacking every day to not lose the practice and get some practice through consistency while learning new attack vectors while facing web applications and analyzing different features and common vulnerabilities every day. The takeaway that I learned during these 30 days was simple, I needed to get familiar with some of the web technologies being shared among wide scopes to exploit multiple endpoints that may be vulnerable to common misconfigurations or vulnerabilities. Here are some of my findings with bounty amount.

Vulnerabilities, Patches, and Missions Status Resolved
Unauthenticated SQL injection Rejected Duplicate
DOM Based Cross Site Scripting Accepted $563.50
HTMLi at Swagger UI (multiple domains) Accepted $240.50
[QR Winner] Unauthenticated Arbitrary File Deletion through CVE-2020-3187 Accepted $935
Database Credentials Disclosure Through Debug Mode (multiple domains) Accepted $764
SAP Web Administration Interface Publicly Available Rejected Low Impact
[Patch Verification] Database Credentials Disclosure Through Debug Mode (multiple domains) Accepted $50
[Patch Verification] Unauthenticated Arbitrary File Deletion through CVE-2020-3187 Accepted $50
[Mission] Overall Claimed Missions Accepted $460

Total Earned: $3,063

Takeaways and Conclusion

After spending over 30 days of constant practice, it can get tiring and frustrating after days of not finding a bug, but the purpose to get familiar and get practice over time while getting obsessed with this field does not have the comparison with such frustration. Spending time looking for bugs couple of hours every day has become fun and some kind of need that I get to experience. I compare this to having a lover, I tend to feel guilty when I don’t spend time with it. The end goal of the 120 days of frequent hacking is to share some takeaways and experiences, therefore, please feel free to reach out on Twitter for a write-up regarding the issues mentioned above.

Thanks for making it to the end!

If you want to chat or just connect, feel free to shoot a direct message on Twitter.

Updated:

Leave a comment