Open in app

Sign In

Write

Sign In

Jayateertha Guruprasad
Jayateertha Guruprasad

192 Followers

Home

About

Published in InfoSec Write-ups

·Pinned

How Browser’s Save As Feature might lead to Code Execution (CVE-2022–45415)

Few days ago, while I was exploring browser based bugs, I read a article over internet explaining about a path traversal vulnerability in Safari browser using Save Page As Feature. The file name was generated from content of <title></title> tag. If title tag contained ../ characters, The file could be saved in…

Bug Bounty

3 min read

How Browser’s Save As Feature might lead to Code Execution (CVE-2022–45415)
How Browser’s Save As Feature might lead to Code Execution (CVE-2022–45415)
Bug Bounty

3 min read


Published in InfoSec Write-ups

·Pinned

Blind SSRF in Skype (Microsoft)

Server Side Request Forgery is a vulnerability that allows attacker to make server request to attacker controlled network location/path. While analyzing requests in Burp for Skype for Web, found a endpoint at *.*.skype.com/path?url=https://example.com …

Hacking

2 min read

Blind SSRF in Skype (Microsoft)
Blind SSRF in Skype (Microsoft)
Hacking

2 min read


Published in InfoSec Write-ups

·Pinned

Grafana Admin Panel bypass in Google Acquisition(VirusTotal)

I started with usual subdomain recon of a google acquisition(VirusTotal).This time I used a online subdomain finder service https://subdomainfinder.c99.nl/ for finding subdomains quickly. Then I found a subdomain grafana.internal.virustotal.com ,The word internal in the subdomain made me visit that page due to my curiousity. But unfortunately ,It’s only for authorized…

Google Vrp

2 min read

Grafana Admin Panel bypass in Google Acquisition(VirusTotal)
Grafana Admin Panel bypass in Google Acquisition(VirusTotal)
Google Vrp

2 min read


Nov 11, 2022

Bypass Duplicate Tweet Protection using negative tweet id

Twitter doesn’t allow making tweets of same content in relatively near time frame. But same content can be there in tweet which is made as reply to another tweet.

Infosec

2 min read

Bypass Duplicate Tweet Protection using negative tweet id
Bypass Duplicate Tweet Protection using negative tweet id
Infosec

2 min read


Published in InfoSec Write-ups

·Sep 16, 2022

Abusing Broken Link In Fitbit (Google Acquisition)To Collect BugBounty Reports On Behalf Of Google !

I usually track acquisitions of websites for which I am hunting bugs regularly. I knew that Fitbit acquisition has been completed by Google and is eligible for bounty in GoogleVRP platform. But, I previously remember that, Fitbit was also part of some other bugbounty platform before Google’s acquisition, So wanted…

Bug Bounty

2 min read

Abusing Broken Link In Fitbit (Google Acquisition)To Collect BugBounty Reports On Behalf Of Google !
Abusing Broken Link In Fitbit (Google Acquisition)To Collect BugBounty Reports On Behalf Of Google !
Bug Bounty

2 min read


May 6, 2022

2FA Bypass in PickMyCareer.in

I found a 2fa bypass recently in a responsible disclosure program — pickmycareer.in . The vulnerability allows an attacker to register any mobile number with his account bypassing OTP verifications. The process is very simple during registration process, attacker gives his own mobile number and receives OTP, enters correct OTP…

Hacking

2 min read

2FA Bypass in PickMyCareer.in
2FA Bypass in PickMyCareer.in
Hacking

2 min read


Apr 15, 2022

How I passed my CEH (Practical) in first attempt

First of all, I am not a complete beginner in infosec/cyber security community. I have been doing bugbounty for past 3 years and also my current job role is related to security engineer. So, I haven’t prepared much as I already use most of the tools frequently at my workplace/CTFs/BugBounty. …

Infosec

2 min read

How I passed my CEH (Practical) in first attempt
How I passed my CEH (Practical) in first attempt
Infosec

2 min read


Feb 25, 2021

Jira Auth Bypass bug in Google Acquisition (Apigee)

I was looking for blogs on GoogleVRP reports as well as noting down it’s popular aquisitions. Then I found a blog (https://tutorgeeks.blogspot.com/2018/08/misconfigured-jira-setting-apigee.html ) which talks about unauthenticated Jira instance leaking dashboard name ,project title and user profile picture by applying filters. It also mentions ,the website supports only logging in…

Infosec

2 min read

Jira Auth Bypass bug in Google Acquisition (Apigee)
Jira Auth Bypass bug in Google Acquisition (Apigee)
Infosec

2 min read


Dec 17, 2020

Download Filename Manipulation due to improper rendering of RTLO characters

This is one of the easiest bug that I have found in a private bugbounty program. The program had two of it’s browsers in it’s scope. I was testing for RTLO related bugs,I found that the downloads section of the browser was rendering the rtlo characters in the improper way. …

Bug Bounty

2 min read

Bug Bounty

2 min read


Apr 21, 2020

CORS bug on GOOGLE’s 404 page REWARDED!!!

This is a story of CORS bug that I found in one of Google’s aquisition -Kaggle,Where I got rewarded for CORS bug in 404 page. One fine day I was looking at one of the aquisitions of Google-(Kaggle),Kaggle is used worldwide by Machine Learning community and is pretty famous. I…

Bug Bounty

3 min read

CORS bug on GOOGLE’s 404 page  REWARDED!!!
CORS bug on GOOGLE’s 404 page  REWARDED!!!
Bug Bounty

3 min read

Jayateertha Guruprasad

Jayateertha Guruprasad

192 Followers

I get paid for breaking things !

Following
  • Igor S. Bederov

    Igor S. Bederov

  • Jonathan Scott

    Jonathan Scott

  • Immunefi

    Immunefi

  • Hacktivities

    Hacktivities

  • Pentester Academy

    Pentester Academy

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech