Payload Party: Chaining Tiny Bugs Into a Full-Blown Account Takeover
作者通过侦察工具发现目标网站的隐藏子域名、开放重定向参数及无CSRF保护的JSON端点等微小漏洞,利用这些看似无关的缺陷进行链式攻击,最终实现账户接管。 2025-8-31 11:20:28 Author: infosecwriteups.com(查看原文) 阅读量:5 收藏

Iski

Free link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by AI

Ever have one of those days where you’re cleaning your desk and find ₹500 you didn’t know existed? That was my bug bounty: small, forgotten bugs that led to a sweet, unexpected payday.

This is my real story — the Payload Party: how I chained micro-flaws, each boring in isolation, into a full account takeover. Grab your favorite drink (coffee recommended ☕) and let’s dive in!

1. Recon Roulette: Gathering the Bug Bits

I began with classic recon tools:

subfinder -d target.com -o subs.txt
amass enum -d target.com -o amass.txt
waybackurls target.com | tee endpoints.txt

These scans turned up:

  • A forgotten subdomain: beta.api.target.com
  • A dusty open redirect param: ?next= in /login/redirect
  • A POST /user/update endpoint that accepted JSON without CSRF protection

文章来源: https://infosecwriteups.com/payload-party-chaining-tiny-bugs-into-a-full-blown-account-takeover-f85d646f3666?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh