Open in app

Sign in

Write

Sign in

Aswin Thambi Panikulangara
Aswin Thambi Panikulangara

386 Followers

Home

About

Jun 19

Bug Bounty Recon (Part-4)

Waybackurls And Discovering Parameters Waybackurls Archived web pages refer to copies or snapshots of websites captured at specific points in time. These snapshots are created and stored by web archiving services, such as the Wayback Machine by the Internet Archive. Archiving web pages allows for the preservation of web content, enabling users to access…

Cybersecurity

3 min read

Bug Bounty Recon (Part-4)
Bug Bounty Recon (Part-4)
Cybersecurity

3 min read


Jun 11

Bug Bounty Recon (Part-3)

Content Discovery using FFUF Content discovery in bug bounty refers to the process of identifying hidden or undiscovered web pages, files, directories, and other content that may contain vulnerabilities or potential security issues. By discovering these hidden assets, bug bounty hunters can expand their attack surface and uncover potential vulnerabilities that may have been…

Bugbounty Writeup

3 min read

Bug Bounty Recon (Part-3)
Bug Bounty Recon (Part-3)
Bugbounty Writeup

3 min read


Jun 5

Bug Bounty Recon (Part-2)

Previous Part: https://aswinthambipanik07.medium.com/bug-bounty-recon-part-1-dad7f86d1b0f Subdomain Enumeration Techniques Subdomain Enumeration Using Certificate Transparency Logs Subdomain enumeration using Certificate Transparency logs involves searching the logs for publicly trusted SSL certificates associated with a domain. There are various online services and tools available that provide access to Certificate Transparency logs.

Bug Bounty Tips

3 min read

Bug Bounty Recon (Part-2)
Bug Bounty Recon (Part-2)
Bug Bounty Tips

3 min read


May 31

Bug Bounty Recon(Part-1)

In the future world of cybersecurity, bug bounty programs have emerged as a vital tool for organizations to identify and rectify vulnerabilities in their digital infrastructure. …

3 min read

Bug Bounty Recon(Part-1)
Bug Bounty Recon(Part-1)

3 min read


May 10

Hunting on memcached servers: Dumping data

What is a Memcached server? Memcached servers are used to store and retrieve data in the form of key-value pairs. When client requests for data from server, its checks for the data stored in the cache. If the data is available, it is loaded into the memory. If the data is not present, the server…

Bug Bounty

4 min read

Hunting on memcached servers: Dumping data
Hunting on memcached servers: Dumping data
Bug Bounty

4 min read


Jul 29, 2021

Playing With s3 — Leaks

Hi Everyone, My name is Aswin Thambi Panikulangara(R0074G3N7). In this writeup, I will be sharing my technique of enumerating s3 buckets, finding misconfigurations, and recent bug i found in a public program(P1). Tools : Subfinder, Ffuf, waybackurls *.redacted.com is in scope. As usual, I started with subdomain enumeration, for subdomain…

2 min read

Playing With s3 — Leaks
Playing With s3 — Leaks

2 min read


Mar 24, 2021

XSS + Cloudflare bypass!

Hi Guys, In this article, I will share how did I found reflected XSS on my target( redacted.com ) The program was an Rdp and they does not allow disclosure.As the target does not provide payments or gifts in exchange, now its time for hall of fame!!!. Most commonly i use subfinder tool + httpx to enumerate subdomains.I got a subdomain “sub.redacted.com” , visited and found a search bar. So i tried my payload : <script>alert(1)</script> to see the response.

Infosec

2 min read

XSS + Cloudflare bypass!
XSS + Cloudflare bypass!
Infosec

2 min read

Aswin Thambi Panikulangara

Aswin Thambi Panikulangara

386 Followers

Bughunter, web pentester, Network pentester

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams