Introduction

This article is a write up on how I found a Stored XSS in Google Ads Android Application where I was rewarded with $3133.70 I was waiting for the fix and after discussing with Google Security Team I am disclosing my finding.

Currently I am ranked in Top 200 at Google Hacker’s Ranking ,

Image for post
Image for post

What is Stored XSS

Stored XSS attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it…


Introduction

This article is a write up on how I found a Blind XSS in Google Analytics Admin Panel where I was rewarded with $3133.70

Currently I am ranked in Top 200 at Google Hackers Ranking,

Image for post
Image for post

What is Blind XSS

Blind XSS vulnerabilities are a variant of persistent XSS vulnerabilities. They occur when the attacker input is saved by the web server and executed as a malicious script in another part of the application or in another application. For example, an attacker injects a malicious payload into a contact/feedback page and when the administrator of the application is reviewing the feedback…


Introduction

This article is a write up on how I found a Privilege Escalation Vulnerability where an attacker can access complete admin portal without authentication which gave me a new CVE-2020–35745.

What is Privilege Escalation?

Privilege escalation occurs when a user gets access to more resources or functionality than they are normally allowed, and such elevation or changes should have been prevented by the application. This is usually caused by a flaw in the application. The result is that the application performs actions with more privileges than those intended by the developer or system administrator.

Usually, people refer to vertical escalation…


Hello Everyone,

Why I gave the title “All In One” is because I will be covering bug bounty platforms, books, list of practice and training programs, methodologies, tools, and wordlist so that beginners should get to know from where and how to start there bug hunting journey !!

Image for post
Image for post

I wish very good luck to you while entering into bug hunting journey but remember as you are getting into it don’t give up because it will definitely take some time, maybe you won't get any bugs in starting maybe you will get duplicate but remember that duplicate is a valid submission…


Introduction

This article is a write up on how I found a 2FA Bypass vulnerability at one of the Top Cryptocurrency Company, no matter your account is blocked or not this bypass works and you are into the account!!

Image for post
Image for post

What is Two-Factor Authentication (2FA)

Two-factor authentication (2FA) adds an extra layer of security to your online accounts by asking for verification code after you sign in with your email address and password.

The verification code is generated by an application on your smartphone. …


Introduction

This article is a write up on how I found a critical XSS vulnerability at Shopify Core in Shopify Bug Bounty Program due to which I was Acknowledged and listed in Top 10 at Shopify Hacker’s Hall of Fame in the World.

Image for post
Image for post

I wrote this for educational purposes only. Do not perform any illegal activity or pen-testing without permission.

Introduction to Cross-site scripting ( XSS )

Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application. It allows an attacker to circumvent the same-origin…


Hello Everyone, this is my last part and the best one to get RCE ( Remote Code Execution). I am happy to change the mindset of my College to look into Security where the Education department doesn’t take cybersecurity seriously unless and until they are hit by Cyber Criminals.

All those who are reading this story, I request every one to take security as a major part in their life, think twice while giving your data to anyone no matter it's your college because sometimes your data is given to third parties to handle and if they don't take major…


Hello Everyone, here is the second part SQL INJECTION where I was able to get the complete database of my college. This story is about the challenge I got from one of the head of my System Department Saying “You can’t do anything, you will just sit in college and do small things…”. I think everyone should understand the importance of Security If someone doesn’t understand make them because this is the way we are protected from cybercriminals and cyber attacks.

I accepted the Challenge “I said nothing to him and went back to my work”. I started thinking, My…


Hello Everyone, this is all about my dream which I used to see from the first year of my college. I am a security enthusiast and always wanted to hack my college but yes my favorite #LearningPhase, I was in a learning phase, so I didn't know much about hacking a server or penetrating network and other critical assets. So I started learning all this stuff, I used to sit in Library for the whole day learning new techniques and tricks.

Finally a day in my life my final year… the story started, it's divided into three parts like three…

Ashish Dhone

Information Security Analyst at Persistent Systems | Synack Red Team Member | CEH v10 | CEH Master | Bug Bounty Hunter

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store