Intigriti Bug Bytes #229 - October 2025 馃殌
By blackbird-eu
October 31, 2025
Hi hackers,
Welcome to the latest edition of Bug Bytes!聽In this month鈥檚 issue, we鈥檒l be featuring:聽
Cool trick to find disclosed secrets in internal web extensions
A repository full of WAF bypasses
Hacking Intercom misconfigurations
Wayback Machine for hackers
And so much more! Let鈥檚 dive in!
INTIGRITI 1025 results are in
October鈥檚聽Intigriti聽challenge聽(by聽@chux13786509) brought hundreds of hackers together to hack a vulnerable web shop for a week!聽With over +100 solves, it easily joins the list of the most solved and most popular challenges ever to be featured on聽Intigriti.聽
聽聽
Quick recap:聽
103聽hackers reported the correct flag聽
First blood went to聽luryus聽
And聽35聽hackers wrote a nice聽write-up聽
Intigriti Challenge 1025
Blogs & videos
Hacking Next.js targets
Hunting for SSRF vulnerabilities in Next.js targets Cover Image
Next.js powers millions of web applications... yet its complexity creates the perfect environment for SSRF vulnerabilities to arise. Developers often expose new endpoints that enable arbitrary HTTP requests.聽In our technical聽article, we documented 3 SSRF attack vectors in Next.js targets and how you can exploit them.
We all know that the efforts of performing reconnaissance pay off.聽Yet,聽hard-coded API keys and exposed credentials聽remain聽one of the most overlooked attack vectors. Sometimes,聽they鈥檙e聽even hidden in plain sight.聽In our comprehensive聽guide,聽we've聽outlined multiple proven methods to discover and聽validate聽secrets across your聽bug聽bounty targets.聽
Finding聽a possible SQL聽injection point only to be stopped by a WAF can feel daunting...聽But what if you could bypass this same WAF and still achieve SQLi? In our technical聽article, we covered multiple ways to聽identify聽the origin IP of your target behind CDNs & WAFs.
Tools & resources
Tools
GraphQL Wordlist
GraphQL Wordlist
Testing聽GraphQL聽targets聽&聽struggling to effectively enumerate more operations and queries?
This comprehensive聽GraphQL聽wordlist, built from 60k+ real聽GraphQL聽schemas,聽contains聽the most common field names, operations, and arguments to help you discover hidden attack surfaces.
Manually running Google dorks is time-consuming and often gets your IP blocked...聽Pagodo聽is a simple, open-source tool that automates the entire Google Hacking Database (GHDB) scraping process, letting you systematically test thousands of dorks against your target while rotating through proxies to avoid detection.聽
Ever wanted to automate your entire recon process for your target?聽Check out聽Frogy聽2.0, an open-source tool that automates聽your聽entire recon workflow. It also helps you prioritize assets based on several factors.聽
WAFs聽don鈥檛聽have to block your payloads...聽This comprehensive聽repository聽documents WAF fingerprinting techniques, evasion methods, and known bypasses for dozens of popular firewalls, helping you understand and test WAF protection mechanisms effectively. Even though the content is from a while ago, some techniques are still relevant today.聽
Heads up mobile hackers! Frida just launched聽Simmy,聽a聽new backend for Apple鈥檚 Simulators on macOS聽that helps you simulate iOS processes just like on physical devices.聽Check out the聽announcement post聽on聽Twitter/X.
Resources
Hacking internal web extensions
Did you know that some organizations publish internal web extensions to public web extension stores?
Some of them contain secrets and even exploitable vulnerabilities on in-scope targets! In our聽post, we show you exactly how to enumerate possible plugins published by your target.
Intercom chat widgets may seem harmless... yet many organizations fail to enforce identity verification, allowing attackers to impersonate any user and access their entire support chat history. This聽write-up聽documents 3 critical misconfigurations that expose sensitive customer conversations, including session leakage and persistent sessions after logout.
This cool research聽article聽documents how you can further leverage a simple CRLF vulnerability into an XSS, even when CSP script-src is set to self.
Server-side cookie overwrites typically prevent cookie-based DOM XSS... yet this聽article聽demonstrates 3 clever bypasses: exploiting scope mismatches between endpoints, leveraging Chrome's innerHTML quirk with img tags, and abusing JSON injection to overwrite window.location for XSS execution.
Wayback Machine can be used in a variety of ways... for us hackers, it can help us expand our attack surface and score more bounties. This聽article聽documents how you can discover hidden pages, links, and parameters with the Wayback Machine.
CSPT (Client-Side Path Traversal) attacks are often seen as low-severity vulnerabilities, yet when further leveraged with services like Cloudflare's Image Proxy, they can be weaponized to leak sensitive cross-origin data. This well-written聽article聽demonstrates how you can exploit scenarios like these.
A good wordlist only helps increase your chances of discovering hidden assets and possibly scoring more bounties. In our聽thread, we shared 5 wordlists that can help you expand your attack surface.
Just getting started with bug bounty? We鈥檝e shared a small thread with links to 4 videos to learn 4 vulnerability types in 400 seconds. Check out聽this thread, and while you鈥檙e at it, make sure to leave a follow if you want us to post more related web hacking content.
Feedback & suggestions
Before you click away:聽Do you have feedback, or would you like your technical content to get featured in the next Bug Bytes issue? We want to hear from you. Feel free to send us an email at聽support@intigriti.com聽or聽DM聽us on X/Twitter, and we鈥檒l take it from there.
Did you like this Bug Bytes issue? Consider sharing it with your friends and tagging us along on X/Twitter, Instagram, or LinkedIn.
Wishing you a bountiful month ahead,
Keep on rocking!
You may also like
Intigriti Bug Bytes #228 - September 2025 馃殌
September 12, 2025
Intigriti Bug Bytes #227 - August 2025 馃殌
August 15, 2025
Intigriti Bug Bytes #226 - July 2025 馃殌
July 18, 2025