Intigriti Bug Bytes #222 - March 2025 šŸš€

By Intigriti

March 14, 2025

Hey hackers,

Each month, we team up with bug bounty experts to bring you insights, platform updates, new programs, and upcoming community events—all to help you find more bugs!

Product updates

New Feature: Gain Deeper Insights into Researcher Activity

We're excited to introduce a new way for researchers toĀ gain valuable insightsĀ into their time allocation across different domains within a program.

By sharing how they distribute their efforts,Ā researchers unlock access toĀ Domain Insights—a comprehensive dashboard that reveals aggregated statistics on how other active researchers in the program are spending their time.

This feature helps researchers benchmark their focus, identify trends, and make more informed decisions about their work.

Intigriti's New Activity Insights

Intigriti's New Domain Insights

Hacking Time: Can you spot the XSS vulnerability?

XSS might be easy to find or not.... Can you seem to spot the cross-site scripting (XSS) vulnerability in this code snippet?

The exploitation method showcased in this example isĀ commonly overseenĀ by most bug bounty hunters, as they’re not aware of the possibility to pass your malicious XSS payload in this different format!

Vulnerable Code Snippet

We highly recommend try to solve this and THEN and only then head out to the solutionĀ here in our X post.

Blogs and Videos

Here is the selection of Intigriti blogs and articles around the internet of the past month we suggest you to read.

Hacking WordPress Targets!

5 Ways to hack WordPress targets Featured Image

Over 500 million websites are powered by WordPress, but not every instance receives the same security attention, especially if it’s a self-hosted WordPress version! In our most recent article, we’ve featuredĀ 5 ways to hack WordPressĀ targets!

  • Checkout systems are prominent to price manipulation vulnerabilities! In our recently rewritten article, we’ve documentedĀ 6 ways to bypass payment gatewaysĀ and place orders for free!

  • The "Top 10 Web Hacking Techniques of 2024" byĀ PortSwiggerĀ is an essential read for penetration testers, security researchers, and developers looking to stay ahead of the latest attack methodologies. This report showcases the most innovative web security vulnerabilities discovered in the past year, providing technical insights into advanced exploitation techniques.
    Key takeaways include:

    • OAuthĀ Flow Hijacking via Cookie Tossing – Exploiting inconsistencies in how browsers handle cookies to hijack OAuth authentication flows, leading to account takeovers.

    • Wildcard Web CacheĀ Deception – Using path traversal techniques to bypass caching rules, allowing attackers to poison web caches and leak sensitive user data.

    • Same-Site Scripting on Mobile Browsers – Leveraging quirks in SameSite cookie handling to escalate session hijacking attacks across subdomains.

    • Advanced Cross-Origin Attacks – New techniques to bypass CORS protections, leading to unauthorized access to restricted web resources.

    • Server-Side PrototypeĀ Pollution in Modern JavaScript Frameworks – Exploiting object prototype manipulation to trigger remote code execution (RCE) in Node.js applications.

    It is aĀ crucial resource for those working in offensive security, bug bounty programs, and secure application development who want to deepen their understanding of modern web exploitation techniques.

Tools and Resources

Tools

Misconfig Mapper

Misconfig Mapper

Misconfig Mapper: This is an automated tool to help you detect security misconfigurations in popular third-party services—got featured inĀ Help Net Security MagazineĀ and crossed 650 GitHub stars! Try it out and give us your feedback or commit!

  • Found a target using GraphQL? We have a whole video series to take you step by step into all related attacks. Find the first video of the seriesĀ here. Insider Tip: Try sending theĀ introspection queryĀ to map out all mutations and queries and explore them inĀ GraphQL Voyager!Ā  Ā 

  • Hacking WordPress targets? Well, there are many out there! Look at WPScan’s complete list ofĀ vulnerable WordPress plugins.Ā We all know as a hacker you want to automate the entire process of finding security vulnerabilities in WordPress CMS, therefore we suggestĀ WPScan.Ā This is an easy-to-use tool to help you automate from backup file scanning to detecting and exploiting vulnerable WordPress plugins!Ā 

  • TheĀ h4ckerĀ repository is a well-structured cybersecurity resource hub, aggregating tools, documentation, and references across domains like reverse engineering, OSINT, penetration testing, and cloud security. Its organized taxonomy ensures efficient access for both novice and expert security professionals.Ā 

Resources

NoSQL Injections by @CryptoCat

@CryptoCat’s most recent videoĀ explains NoSQL injectionsĀ in database operators to help bypass authentication!

  • @coffinxp7 sharesĀ his methodologyĀ on finding information disclosure vulnerabilities using the Internet Archive (Wayback Machine)!Ā 

  • @bxmbn documents a bypass of one of hisĀ recent IDOR reportsĀ that resulted in a $10,000 bounty!Ā 

  • Vitor shares how heĀ hackedĀ high-profile bug bounty targets and earned over $30,000 in bounties!Ā 

  • VHost fuzzing is a must nowadays! Discover how you can perform virtual host fuzzing using Ffuf with thisĀ one simple command!Ā 

  • Are you aware of these common vulnerabilities in e-commerce targets? @irsdl has shared aĀ complete guideĀ featuring several attack vectors in financially oriented web applications!Ā 

  • Ever wondered how most experienced hackers find interesting parameters? We’ve documented 6 methods toĀ enumerate hidden parametersĀ in API endpoints and application routes!Ā 

  • Are you fuzzing with multiple HTTP methods? If not, you should! We've featured a simple way toĀ bruteforce content using FfufĀ with multiple different HTTP methods! And while you’re there, drop us aĀ follow!Ā 

  • This oldie but goodie video series forĀ reverse engineeringĀ has been brought up by one of our employees, and we do see why! It is a very detailed and step by step guide that everyone can follow. If you are new or struggling with reversing, we highly recommend this series to help you to dive into this challenging but interesting topic of hacking.Ā 

Behind the screens

Grafana Open Port EventĀ 

Recently, 10 epic researchers teamed up at our Open Port event to hackĀ Grafana Labs—a public program on Intigriti! If you want to get involved in the next one, make sure to submit lots of bugs and your effort will be rewarded with bonuses and cool events like this!

Grafana Open Port Event

Events

Intigriti @ Vulncon 2025Ā 

Next month, Intigriti will be sponsoringĀ CVE/FIRST VulnCon 2025Ā for the second year, and we’d love to connect with you! We will be there from April 7-10, 2025, so be sure to stop by and say hello to claim your swag and meet the team! We’re also thrilled to announce that our very ownĀ Niels HofmansĀ will be taking the stage to present:
šŸŽ¤Ā š˜šš˜¤š˜¢š˜­š˜Ŗš˜Æš˜Ø š˜š˜¶š˜­š˜Æš˜¦š˜³š˜¢š˜£š˜Ŗš˜­š˜Ŗš˜µš˜ŗ š˜”š˜¢š˜Æš˜¢š˜Øš˜¦š˜®š˜¦š˜Æš˜µ: š˜ˆ š˜šš˜¤š˜¢š˜­š˜¦-š˜œš˜±'š˜“ š˜‘š˜°š˜¶š˜³š˜Æš˜¦š˜ŗ š˜µš˜° š˜Œš˜Æš˜µš˜¦š˜³š˜±š˜³š˜Ŗš˜“š˜¦-š˜Žš˜³š˜¢š˜„š˜¦Ā š˜šš˜¦š˜¤š˜¶š˜³š˜Ŗš˜µš˜ŗĀ 


How can it get any better than this? šŸ˜Ž

Feedback and Suggestions

If you have feedback or suggestions to help us build and grow, we want to hear from you! Pop a note over toĀ support@intigriti.comĀ and we’ll take it from there!

Wishing you a bountiful month ahead,Ā 

Keep on rocking!Ā 

Join 125,000+ Security Researchers Getting Monthly Bug Bounty Tips & Insights!

You may also like

Welcome to the latest edition of Bug Bytes! In this month’s issue,Ā we’llĀ be featuring:Ā  Finding an RCE using AI in GitHubĀ  CORS exploitation cheat sheetĀ  Scanning codebases with AIĀ  Bypassing paywallsĀ  SSTIs in AI models Ā Ā  And so much more!Ā Let’sĀ dive in! We are thrilled to announce that Inti

Read more

Welcome to the latest edition of Bug Bytes!Ā In this month’s issue, we’ll be featuring:Ā  Cool trick to find disclosed secrets in internal web extensions A repository full of WAF bypasses Hacking Intercom misconfigurations Wayback Machine for hackers And so much more! Let’s dive in! October’sĀ 

Read more

Welcome to the latest edition of Bug Bytes!Ā In this month’s issue, we’ll be featuring:Ā  A common (yet unknown) SSRF attack vector in Next.js MiddlewareĀ  Exploiting PDF processors by generating and uploading malicious PDF payload filesĀ  A full reconnaissance breakdown on how to approach any targetĀ 

Read more