Intigriti Bug Bytes #226 - July 2025 馃殌
By Intigriti
July 18, 2025
Hi hackers,
Welcome to the latest edition of Bug Bytes! In this month鈥檚 issue, we鈥檒l be featuring:聽
Exploiting Log4Shell (Log4J) in 2025聽
An indispensable GitHub recon tool (not the one you have in mind)聽
A repository full of bug bounty tips, resources and tools聽
One of the most comprehensive guides on finding exposed S3 buckets聽
聽聽
And so much more... Let鈥檚 dive in!
INTIGRITI 0625 results are in!
Tougher than ever before: only 13 researchers found their way in and captured the flags. This latest challenge by聽@Toogidog聽featured a cache poisoning vulnerability and a remote code execution using Chromium.
Quick recap:
13 hackers reported the correct flag
First blood went to聽@dimariasimone
And 4 hackers wrote a nice聽writeup聽(including some interesting unintended solutions you can learn a thing or two from)
INTIGRITI 0625 Challenge
Latest platform updates
New: Skillset matching
We鈥檝e recently introduced a 'Required Skills' feature for program assets. Companies can now tag their assets with a matching skillset that鈥檚 required to test the asset type.
It has never been easier for researchers like you to easily find programs and assets that match your specific hacking skills and receive accurate new program recommendations.
Intigriti skillset matching
Blogs & videos
Exploiting SSTI vulnerabilities
SSTI: A complete guide to exploiting advanced SSTI vulnerabilities Cover Image
Server-side template injections (SSTIs) are still common and can often be escalated to RCE... yet most bug bounty hunters still struggle to spot them.聽In our聽article, we鈥檝e outlined several SSTI exploitation techniques, including advanced filter and sandbox bypasses.
While most moved on, some bug bounty hunters are still hunting for Log4Shell even to this day.聽In our most recent聽article, we show you exactly how to uncover Log4Shell vulnerabilities that others are missing in 2025.
Throwback to our previous article: Prepping for an upcoming CTF competition?聽No stress, we鈥檝e got your back. Read our beginner-friendly聽guide聽where we share 10 practical tips to help you solve your first CTF challenge.
Tools & resources
Tools
MapperPlus
MapperPlus JavaScript sourcemap unpacker
Found a聽JavaScript source map file but failed to read it?聽Check out聽MapperPlus,聽a simple tool to unpack JavaScript source map files using a headless web browser.
If you鈥檇 like to learn more about the significance of JavaScript files for bug bounty hunters and how properly examining these files can land you more bounties, check out this聽article.
Just starting in bug bounty, or are you looking to learn about more attack vectors?KingOfBugBountyTips聽is a collection of bug bounty tips, resources, tools, and so much more to help you land your first or next bounty.
We all understand the importance of performing GitHub reconnaissance.聽GitHub Dork Helper聽is a simple tool that auto-prefills possible keywords you can search for on your target鈥檚 repositories.
Resources
Find more vulnerabilities with reconnaissance
Find more vulnerabilities with reconnaissance
Want to learn how to start finding more vulnerabilities... with reconnaissance?聽Our recent in-depth聽thread聽provides a step-by-step guide to help you spot more vulnerabilities by leveraging information that鈥檚 already out there.
Need to quickly figure out the origin IP of your target server?聽Check out聽this聽simple checklist that outlines 5 different ways to determine the origin IP of targets behind Cloudflare, Akamai, etc. And let us know if you found it helpful by following us聽@INTIGRITI!
S3 buckets聽are everywhere. But that doesn鈥檛 mean they are all properly configured. This聽article聽by @coffinxp outlines an interesting way to find exposed S3 buckets like a pro.
Looking for a full guide on GitHub recon from a pro hacker?聽Check out聽this聽detailed article by @GodfatherOrwa covering common GitHub reconnaissance techniques to discover secrets and other leaked data.
Still haven鈥檛 found your first server-side request forgery vulnerability?聽This detailed聽walkthrough, curated by 2 talented hackers, share their story of finding SSRFs in the wild.
Need some resources to learn more about server-side template injections?聽We got you covered.聽This聽thread features 5 videos, all teaching the concept of SSTI identification and exploitation.
JavaScript files are goldmines for bug bounty hunters.聽This聽deep dive by kpwn goes through common ways to manually analyze JavaScript files.
Web application firewalls (WAFs) can be frustrating and tricky to evade.聽This article by Isec goes in-depth on common evasion techniques to bypass WAFs altogether.
Behind the screens
Meet Intigriti at DEF CON 33
Are you ready for DEFCON33? The Intigriti team is!
Come join us on August 7-10 at the Bug Bounty Village and let鈥檚 make this DECON unforgettable!
We love to connect with valuable researchers like you!聽
Meet Intigriti at DEF CON 33
Feedback & suggestions
Before you click away:聽Do you have feedback, or would you like your technical content to get featured in the next Bug Bytes issue? We want to hear from you! Feel free to send us an email at聽support@intigriti.com聽or聽DM聽us on X/Twitter, and we鈥檒l take it from there.
Did you like this Bug Bytes issue? Consider sharing it with your friends and tagging us along on X/Twitter, Instagram, or LinkedIn.
Wishing you a bountiful month ahead,
Keep on rocking!
You may also like
Intigriti Bug Bytes #225 - June 2025 馃殌
June 13, 2025
Intigriti Bug Bytes #224 - May 2025 馃殌
May 23, 2025
Intigriti Bug Bytes #223 - April 2025 馃殌
April 11, 2025