Bug Bytes #206 – Citrix more like Crit-trix amiright?

By travisintigriti

July 5, 2023

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.

This issue covers the week from June 26th – July 2nd.

Intigriti News

From my notebook

  1. Reversing Citrix Gateway for XSS and Advisory: Citrix Gateway Open Redirect and XSS (CVE-2023-24488) – You’ve likely already seen this as it’s hit social media over the weekend but just in case you missed it!

  2. Scale Your Cloud Infrastructure (Hosting CTFs) – Really interesting look to what goes into running a CTF event!

  3. The Power of Bug Bounty Automation with Nenad Zaric – The founder of Trickest talks about workflows, recon and data for bug bounty hunters!

  4. Episode 25: 2xMVH & Multi-million dollar hacker Inhibitor181 – There’s some great strategy/how to approach a target information in this episode with Inhibitor181, definitely a must listen!

  5. Testing GraphQL APIs | Web Security Academy – Portswigger add some GraphQL labs to their free Web Security Academy

Join 125,000+ Security Researchers Getting Monthly Bug Bounty Tips & Insights!

You may also like

Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  Finding an RCE using AI in GitHub  CORS exploitation cheat sheet  Scanning codebases with AI  Bypassing paywalls  SSTIs in AI models    And so much more! Let’s dive in! We are thrilled to announce that Inti

Read more

Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  Cool trick to find disclosed secrets in internal web extensions A repository full of WAF bypasses Hacking Intercom misconfigurations Wayback Machine for hackers And so much more! Let’s dive in! October’s 

Read more

Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  A common (yet unknown) SSRF attack vector in Next.js Middleware  Exploiting PDF processors by generating and uploading malicious PDF payload files  A full reconnaissance breakdown on how to approach any target 

Read more