noob discovers fuzzing

imwaiting18
1 min readJun 8, 2021

Osu! Mina-san

I’ll be telling y’all how I got my first bounty after six months of hunting regularly.

It was an unlisted program, let’s call it example.com. (Always wanted to say this :”) )

So I started hunting on the site with some basic sub-domain enumeration and validation. After validating the sub-domains now it was time to start fuzzing these babies to get some sensitive info. (Evil laugh)

I started my Virtual Machine and started fuzzing the list of sub-domains, at first I did not find anything impactful which sadly continued till the end of the list until I got a ‘test’ endpoint. Normally this endpoint wouldn’t disclose anything crucial but luckily it redirected me to some private data being leaked and there you have it. (Private data being leaked: CV of a personal employee)

URL: https://abc.example.com/test

Tool: https://github.com/maurosoria/dirsearch

– – – – – – – – – – – – – – – – – – – –

Reported on: 26th March 7:33 PM

Triaged on: 26th March 8:27 PM

Rewarded on: 2nd April with 1,000 Rs gift card :)

Thanks for reading, until next time.

Saraba da!

--

--

imwaiting18

linkedin.com/in/rajyaguruvirang I hack stuff and talk about it. Open to collaborating on Cool Cyber Security projects. Exploring Mobile Pentesting and Security