Skip to content

Security Breached Blog

| One step at a time There's no need to rush It's like learning to fly! |

Menu
  • Home
  • Who Am I
  • Bug Bounty Guide
Menu

Tag: BugBounty

Hacking 100k+ Loyalty Programs for Fun and Profit!

Posted on May 19, 2022May 19, 2022 by Muhammad Khizer Javed

This blog post is about how a hacker could have Hacked 100k+ Loyalty Programs to get free points & redeem them for free stuff or coupons.

Read more

Hacking Subscription Plans for free service.

Posted on February 27, 2022May 19, 2022 by Muhammad Khizer Javed
Read more

Using Inspect Element to Bypass Security restrictions | Bug Bounty POC

Posted on June 30, 2020May 22, 2022 by Muhammad Khizer Javed

Hey guys so this blog post is about bug bounty report, I was able to Bypass Security restrictions by using inspect element and use Paid Features. About the Issue: The issue is really simple to execute. I was looking for a way to use the service for free and managed to find it so easily…

Read more

Microsoft Apache Solr RCE Velocity Template | Bug Bounty POC

Posted on March 31, 2020May 22, 2022 by Muhammad Khizer Javed

Hey guys so this blog post is about RCE issue reported to Microsoft bug bounty program, Remote Code execution issue existed in microsoft.com subdomain running Apache Solr.   I’ll try to be as simple as possible. Participated in Microsoft Bug Bounty Program first time.. About the RCE: While doing some recon on microsoft.com website i…

Read more

Exploiting Insecure Firebase Database!

Posted on February 4, 2020May 22, 2022 by Muhammad Khizer Javed

Hey guys so this blog post is about Exploiting Insecure Firebase Databases, due to Improper set security rules one can write data to the database in certain conditions here’s a Short POC tutorial of the issue. A few days ago i was doing static analysis of an Android app on a bug bounty target, as…

Read more

Hacking a Company Through help desk – Ticket Trick | Bug Bounty POC

Posted on November 5, 2018 by Muhammad Khizer Javed

Hey,   So First of all before i start writing about this issue i want you guys to read the blog about Ticket Trick it was written by Inti De Ceukelaire (Thanks to him for sharing this and help us work on it to secure more companies ). This blog is just about my experience with this issue and…

Read more

Hunting Insecure Direct Object Reference Vulnerabilities for Fun and Profit (PART-1)

Posted on February 4, 2018February 5, 2018 by

Hello Guys!! This is my first Blog post and i am starting with IDOR Vulnerability. In this Post you will know about many endpoints to test IDOR vulnerability! Hope you will like it. Arbaz Hussain get invitation to test one private program and find vulnerabilities with his team mates but he was busy with his…

Read more

My Guide to Basic Recon? | Bug Bounties + Recon | Amazing Love story.

Posted on November 25, 2017 by Muhammad Khizer Javed

Hi All, So I decide to write about the Love story between Bug Bounties & Recon. First of all I’m not much of an Expert so I’m just sharing my opinion. This blog post will be focusing on recon & where to look for bugs In a Bug Bounty Program, This is not a guide…

Read more


  • Microsoft Apache Solr RCE Velocity Template | Bug Bounty POC
  • How I was able to Download Any file from Web server!
  • KNOXSS for Dummies! A new Detailed Guide to use KNOXSS Pro in real world
  • P1 Like a Boss | Information Disclosure via Github leads to Employee Account Takeover | Bug Bounty POC
  • Hacking SMS API Service Provider of a Company |Android App Static Security Analysis | Bug Bounty POC
  • Privilege Escalation like a Boss

Tweets by KHIZER_JAVED47
© 2023 Security Breached Blog | Powered by Minimalist Blog WordPress Theme
 

Loading Comments...