Accessing the website directly through its IP address, a case

Accessing the website directly through its IP address, a case

You may have heard the expression: hiding in plain sight. And specifically in IT security there is another expression: security through obscurity. This article will be my experience with a bug where one could argue that it was the case of security through obscurity, but it could have been a coincidence. This will be a story of me stumbling onto sql injection (a simple login bypass which logged me into admin panel), but not in a usual way.

You may have heard the expression: hiding in plain sight. And specifically in IT security there is another expression: security through obscurity. This article will be my experience with a bug where one could argue that it was the case of security through obscurity, but it could have been a coincidence. This will be a story of me stumbling onto sql injection (a simple login bypass which logged me into admin panel), but not in a usual way. Either way, it should give you an idea or two for what to look for in the future. Unless if you are already on to it.

First impression, wrong impression:

The bbp in question had a wide scope, the trusty *.website.com. Love those :) Which, of course, meant time to do a lot of recon action. Using tools like massdns, amass, a bit of crt.sh, etc.

When all the subdomains were collected, I started going through those that sounded interesting. And, there was this subdomain which just showed a simple Help/About me type of page. At first glance — nothing there. No forms, no additional links, nothing to give a clue about it being anything, but a static page. Time to move on?

network-security bug-bounty hacking website-security infosec

Bootstrap 5 Complete Course with Examples

Bootstrap 5 Tutorial - Bootstrap 5 Crash Course for Beginners

Nest.JS Tutorial for Beginners

Hello Vue 3: A First Look at Vue 3 and the Composition API

Building a simple Applications with Vue 3

Deno Crash Course: Explore Deno and Create a full REST API with Deno

How to Build a Real-time Chat App with Deno and WebSockets

Convert HTML to Markdown Online

HTML entity encoder decoder Online

Grindr's Bug Bounty Pledge Doesn't Translate to Security

At [email protected], Luta Security CEO Katie Moussouris stressed that bug bounty programs aren't a 'silver bullet' for security teams.

Wormable Apple iCloud Bug Allows Automatic Photo Theft

Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for discovering 55 bugs, 11 of them critical, during a three-month hack. The wormable iCloud bug is a cross-site scripting (XSS) issue, according to the writeup.

Security Website Design

Have A Project In Mind? Let’s Talk About IT !!! Ask Free Quote Now!!! We would love to hear from you – Our Customer Executive Will Reach Through Call, Skype Or Email Within 12 Working Hours. SIGN AN NDA As we believe that every business idea is precious so we take care of confidentiality of … Request a Free quote Read More »

Apple Security Research Device Program Draws Mixed Reactions

Apple's Security Research Device program is now open to select bug bounty hunters.

TikTok Launches Bug Bounty Program Amid Security SNAFUs

The move is a distinct change in direction for the app, which has been criticized and even banned for its security practices. To submit bugs to be evaluated under the program, researchers can use an online form, Wu said.