• Disclosed.
  • Posts
  • Disclosed. June 23, 2025: Spaceraccoon's Book Pre-Order, AssetNote's Novel SSRF Technique, YesWeCaido Integration, and more.

Disclosed. June 23, 2025: Spaceraccoon's Book Pre-Order, AssetNote's Novel SSRF Technique, YesWeCaido Integration, and more.

The bug bounty world, curated.

Welcome to Disclosed.

Each week, 3 readers will win a 1-month PentesterLab Pro license, completely free. Refer a friend to the newsletter to enter.

Shout out to this week’s winners (I will email you):

4k41
fjquirogap200105
sarazf3

PentesterLab is one of the best hands-on platforms for learning web security, with real-world vulnerabilities, private labs, and practical exercises trusted by professionals and bug bounty hunters worldwide.

Huge thanks to PentesterLab for sponsoring this giveaway and supporting the Disclosed. community. ❤️

 

Hey there! I hope you’re staying safe out there, and that this post gives you a few minutes of escape from everything going on in the world right now.

If you're eyeing a PentesterLab license, definitely jump into the giveaway. There are not many entries so far, so your odds are pretty great.

Things are picking up at work and over at Bug Bounty Village. Big thanks to Critical Thinking for the shout-out this week. If you haven’t checked out their pod yet, it’s worth a listen.

A lot’s happening in the bug bounty world, so let’s dive in.

In This Issue

“From Day Zero to Zero Day” Pre-Order Available [🔗 Tweet]
by @spaceraccoonsec

From Day Zero to Zero Day by Eugene "Spaceraccoon" Lim is a hands-on guide that teaches practical vulnerability research techniques, including code review, reverse engineering, fuzzing, and exploit development. Designed for both beginners and experienced researchers, it walks readers through real-world examples to help them identify, analyze, and report security vulnerabilities across various platforms.
Pre-order →

YesWeHack & Caido Introduce YesWeCaido [🔗 Tweet]
by @yeswehack

YesWeHack has introduced a new plugin for Caido that facilitates easier management and addition of bug bounty targets, streamlining the workflow for security researchers.
Read the full tweet →

Novel SSRF Technique Involving HTTP Redirect Loops
SearchLight Cyber (Shubham Shah)

The technique leverages open‑redirect loops to bypass SSRF defenses by chaining trusted redirects until eventually hitting a malicious destination, effectively evading filters that only check initial URLs. Attackers set up a benign-looking domain that redirects internally behind the scenes, allowing them to stealthily reach internal or restricted services via repeated, allowed redirections.
Read more →

Have something you want to Spotlight? Tell me.

HackerOne Welcomes 30 New Brand Ambassadors Worldwide [🔗 Tweet]
by @Hacker0x01

HackerOne is excited to welcome 30 new Brand Ambassadors from 8 new locations, promoting collaboration and knowledge sharing among security researchers.
Read the full tweet →

HackerOne crowns Japz as Ambassador of the Quarter [🔗 Tweet]
by @Hacker0x01

During HackerOne's quarterly town hall, Brand Ambassadors shared achievements and acknowledged a leading security researcher for their contributions.
Read the full tweet →

OVHcloud Launches Limited-Time Bug Bounty Challenge [🔗 Tweet]
by @yeswehack

OVHcloud has introduced a limited-time bug bounty challenge via YesWeHack, providing increased rewards for critical and high-severity vulnerabilities.
Read the full tweet →

CoinDesk Data Launches New Bugcrowd API Program [🔗 Tweet]
by @Bugcrowd

CoinDesk Data has launched its API program on Bugcrowd, inviting researchers to identify vulnerabilities in the system.
Read the full tweet →

NiceHash Doubles Rewards for Critical Bug Findings [🔗 Tweet]
by @Hacker0x01

From June 22 through July, NiceHash is offering doubled rewards for findings of critical and high vulnerabilities, encouraging bounty hunters to get involved.
Read the full tweet →

Join Intigriti's Challenge for €400 in Prizes [🔗 Tweet]
by @intigriti

Intigriti announces a capture the flag challenge with a prize pool of €400 for participants, offering tips through tweet engagements.
Read the full tweet →

Bug Bounty Village Sponsor & Speaker Announcements
by @BugBountyDEFCON

Sponsor and speaker lineups are starting to be announced on BBV’s Twitter page, with Jason Haddix listed as the keynote speaker. 
Read the full tweet →

HackerOne is Hiring Product Security Analysts in Pune [🔗 Tweet]
by HackerOne

HackerOne is hiring Product Security Analysts for an in-office, shift-based role in Pune. Recruiter calls begin the week of July 7, with tech rounds from July 14–25 and a challenge scheduled between July 28 and August 1.
Apply →

Did I miss an important update? Tell me.

Find Exposed Secrets & Maximize Bug Bounty Rewards [📁 Tool]
by @arshadkazmi42

iScan.today is a scanning tool for bug bounty hunters, revealing exposed secrets across platforms. The post also shares success stories of substantial rewards from identified vulnerabilities.
Read more →

Tiny XSS Payloads [📓 Blog]
by @terjanq

This post compiles a list of compact XSS payloads applicable across various contexts, including instances with restricted inline scripts.
Read more →

GitHub - musana/CF-Hero: CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications [📁 Tool]
by musana

CF-Hero is designed for uncovering origin IP addresses behind Cloudflare, employing diverse reconnaissance methods and intelligence sources.
View the tool →

Introducing a Bug Bounty Progress Tracker [🔗 Tweet]
by @payloadartist

This new bug bounty progress tracker app focuses on privacy and offline use, providing a straightforward approach without data collection.
Read the full tweet →

GitHub - KingOfBugbounty/enumrust: Subdomain Enumerator and Simple Crawler [📁 Tool]
by KingOfBugbounty

The enumRust framework is designed for robust domain analysis, offering features like subdomain enumeration and vulnerability detection using tools such as subfinder and httpx.
View the tool →

GitHub - nullfuzz-pentest/shodan-dorks: Shodan Dorks [📁 Tool]
by nullfuzz-pentest

This GitHub repository features specialized search queries for Shodan, assisting security researchers in spotting vulnerabilities across internet-connected devices.
View the tool →

Fast Tool for Large-Scale Subdomain Discovery [🔗 Tweet]
by @yz9yt

This author shares a new tool for quick large-scale subdomain discovery, boosting efficiency for bug bounty hunters.
Read the full tweet →

Introducing Exploit Generator Plugin for Easy PoC Creation [🔗 Tweet]
by @CaidoIO

A new 'Exploit Generator' plugin streamlines the creation of executable proof-of-concept code from intercepted requests, providing significant time-saving benefits.
Read the full tweet →

Have a favorite tool? Tell me.

Bypassing Domain Validation for Internal App Access [[📓Blog]
by @yppip

A security researcher discovered a vulnerability in AWS Cognito’s email domain validation where a misconfigured regex pattern (domain\.com) mistakenly allowed unauthorized domains like maliciousdomain.com to bypass authentication.
Read more →

How a Simple Logic Flaw Let Me Steal Any User’s Account [📓 Blog]
by Abdelkader Mouaz (Hamzadzworm)

Details a logic flaw that permitted account takeover by leveraging username patterns and stored XSS vulnerabilities. The post illustrates the significance of recognizing seemingly minor features' impact on security.
Read more →

From Login Page to Full Admin Panel Takeover [📓 Blog]
by rood

This write-up recounts the author's journey from identifying a vulnerability on a login page to gaining full admin privileges by exploiting misconfigured HTTP redirects and a privilege escalation technique, highlighting the importance of thorough reconnaissance.
Read more →

Did I miss an important update? Tell me.

Drama, PDF as JS Chaos, Bounty Profile Apps, And More (Ep. 127)
by Critical Thinking Podcast

Justin and Joel cover standout exploits and bug bounty trends, including new tools like Newtowner for regional IP bypass detection, advanced LLM exfiltration tricks using markdown, and a breakdown of what it really takes to go full-time in bug bounty hunting based on payout math.

How Hackers Take Over Accounts [🎥 Video]
by DeadOverflow

This video explores an account takeover vulnerability stemming from improper handling of password reset requests, detailing how attackers exploit email parameter pollution. It emphasizes the financial impact of such vulnerabilities, using a real incident involving GitLab as a case study.
Watch video →

Grafana CVE-2025-4123: How XSS + Open Redirect Led to Full Account Takeover [🎥 Video]
by Medusa

The video dissects CVE-2025-4123 in Grafana, explaining how an open redirect vulnerability can be exploited through SSRF and stored XSS, culminating in full account takeover.
Watch video →

Bug Bounty Tip: How To Know When You Are Ready To Find Bugs [🎥 Video]
by ChillingAndTalking

This video discusses determining readiness for bug hunting, focusing on understanding business logic. It demonstrates how API call parameter manipulation can reveal vulnerabilities using a practical example from Yelp.
Watch video →

Did I miss something? Tell me.

Building LLM Agents for AI Security Challenges [🔗 Tweet]
by @Bugcrowd

This tweet highlights a blog post focused on creating an LLM agent for tackling AI security challenges, covering essential techniques such as prompt injection.
Read the full tweet →

Is CSRF Dead? Discovering and Exploiting CSRF vulnerabilities [📓 Blog]
by Ali Hussainzada

This blog post investigates the continuation of CSRF vulnerabilities in modern web applications, detailing exploitation techniques and the ongoing relevance of CSRF as a threat vector.
Read more →

Automation for Smarter Bug Hunting [📓 Blog]
by Monika Sharma

This article emphasizes the role of automation and AI in modern bug hunting, showcasing how tools like Subfinder and Amass, combined with AI, can boost efficiency.
Read more →

How a PDF File Can Expose Your Application’s Real IP (Even with CDN and WAF) [📓 Blog]
by Vedgeta

This post examines how applications processing PDFs can inadvertently expose real IP addresses, explaining the exploitation of this vulnerability through crafted PDF files.
Read more →

Detecting and Exploiting Business Logic Flaws in Real Web Apps [📓 Blog]
by Karthikeyan Nagaraj

This article discusses the critical significance of business logic flaws and their potential to exploit intended application behaviors, underlining the importance of manual exploration in penetration testing.
Read more →

Did I miss something? Tell me.

Effective Prompt Injection Techniques for AI Models [🔗 Tweet]
by Critical Thinking - Bug Bounty Podcast

This tweet provides practical prompt formats that enhance prompt injection techniques based on AI model training data.
Read the full tweet →

XSS Filter Bypass Technique Using Blacklisted Symbols [🔗 Tweet]
by Anton

This tweet describes a technique to bypass XSS filters when blacklisted symbols are present in HTML attributes, providing corresponding payloads.
Read the full tweet →

Using cURL to Confirm RCE with Timing Checks [🔗 Tweet]
by HackingHub

This tweet details a method for confirming Remote Code Execution vulnerabilities by analyzing server response times with cURL.
Read the full tweet →

Techniques to Discover Hidden Parameters for Vulnerabilities [🔗 Tweet]
by Pratik Dabhi

This tweet outlines effective methodologies for uncovering hidden parameters that could lead to identifying security vulnerabilities.
Read the full tweet →

Exploiting LFI Vulnerability in CustomImages.aspx Script [🔗 Tweet]
by N$

The tweet discusses a Local File Inclusion (LFI) vulnerability within a script responsible for fetching custom images from a server, detailing the exploitation payload.
Read the full tweet →

Submit High Severity Bugs Promptly to Avoid Missed Rewards [🔗 Tweet]
by N$

The author emphasizes the urgency of reporting high-severity bugs immediately, sharing insights from personal experiences related to bounty losses.
Read the full tweet →

Bypassing CSP Restrictions with JSONP Endpoints [🔗 Tweet]
by Intigriti

This tweet discusses techniques for bypassing Content Security Policy (CSP) using JSONP endpoints, relevant for evading XSS protections.
Read the full tweet →

Remembering CSS Exfiltration in HTML Injection Testing [🔗 Tweet]
by André Baptista

The tweet highlights the necessity of testing for CSS exfiltration during HTML injection assessments, mentioning a specific tool that assists researchers in this regard.
Read the full tweet →

Exploiting SVG Execution Bugs in Chrome and Safari [🔗 Tweet]
by Gareth Heyes

This user shares a demonstration of executing SVG vulnerabilities across Chrome and Safari, noting the discrepancies in how these browsers process SVG content.
Read the full tweet →

Leveraging CORS Misconfigurations for Internal Access PoCs [🔗 Tweet]
by Intigriti

This tweet elaborates on exploiting CORS misconfigurations when ACAC is set to 'false', crafting proof of concept attacks on internal hosts reachable only by the victim.
Read the full tweet →

Did I miss something? Tell me.

Did you like this week's drop?

Please share feedback.

Login or Subscribe to participate in polls.

 

Because Disclosure Matters: This newsletter was produced with the assistance of AI. While I strive for accuracy and quality, not all content has been independently vetted or fact-checked. Please allow for a reasonable margin of error. The views expressed are my own and do not reflect those of my employer.