XSS Case Study

XSSes are everywhere. They’ve been the most common vulnerability class for years. But while popping an alert may seem simple, there’s much, much more to cross-site scripting.

Here’s the table of contents of this case study:

  1. What XSS types are the most common?
  2. Why did the XSSes occur?
  3. Where were these XSSes found?
  4. How many of them were blind?
  5. What payloads were used?
  6. What filter bypasses were used?
  7. What was the impact?
  8. How often did attackers need to bypass CSP?
  9. The wordlist of vulnerable parameters
  10. The database with 174 reports


Account Takeover Case Study


The number of $20k+ reports in the account takeover case study absolutely shocked me! I knew there were a lot but I didn’t expect that many. In total, I studied reports worth $1,308,980.70 of bounties. Yes, over $1,3 million! And I liked the outcome of the case study equally as I liked this number. I think it’s the best case study I’ve written so far.

I also created a checklist based on those reports so that you know what things you should check for when hunting for account takeover bugs.

From this article you can learn:

  1. What attacks are more lucrative – client-side or server-side?
  2. How user interaction influences bounty amount?
  3. What functionalities are most susceptible to account takeovers?
  4. What are the most common ways to takeover an account?
  5. Checklist – what to check for to find account takeovers
  6. The report database


IDOR Case Study


IDORs are often recommended as the easy vulnerability class, good to start the bug hunting journey. “Just change the ID in the URL parameter” they say. But are they really that easy? Well, to find it out, I analysed 187 public bug bounty IDOR reports to see how are people really making money with IDORs.

From this article you can learn:

  1. Where to look for IDORs?
  2. What’s usually the impact of an IDOR?
  3. What’s the most common place for a payload? (spoiler: it’s not the URL query!)
  4. What are the most common identifier types?
  5. How to predict the identifier?
  6. Protection bypasses
  7. Parameter wordlist
  8. The database with 187 reports


What do the users say?







ACCESS NOW

GRZEGORZ NIEDZIELA

I was a pentester but I made a decision to quit my job for bug bounty and creating content. I’m documenting my learning journey by creating the best materials about web-security in the form of this newsletter, Bug Bounty Reports Explained YouTube channel, Bug Bounty Reports Discussed podcast and all the other social media channels.






SOME OF THE COMPANIES I'VE HELPED TO SECURE