XSS like a Pro

Hello Friends,

I'm gonna share my interesting finding here.

About two months ago, I received a private invitation on Bugcrowd and the next day I started to look for bugs on that website because there was only one target (testing site) in scope and they provided me some credentials.

I can't disclose the site name, so let's assume

First of all, I logged-in to that site ( with the provided credentials and inspected the site around 15 minutes and tried to understand it.

After that, I started to look for bugs and found multiple bugs mostly stored XSS. At that day, I had found a total 11 vulnerabilities. I reported them and received a bounty on each report. So, I'm not disclosing the bounties. Also, I'm not sharing my all findings but some.

At the beginning, I tried to change my default password and successfully changed my password to '1' which was the first bug that there is no password policy. After that, I checked some…

XSS in Zoho Mail

Hello Friends,

How are you all? I hope you are doing good. 

After a long time, I'm sharing another interesting finding here.

Last month I found an XSS vulnerability in Zoho Mail. 

I was busy with my exams. I had to send some work via email to my friend. So, I opened my laptop and then opened my google mail and saw that I've received so many emails. After completing my work and sending an email, I opened my other emails ie Yahoo, Zoho, Hotmail/Outlook etc. and read all emails but nothing was important.

So, I was closing my laptop and at that time, something clicked my mind that there is no image proxy on Zoho mail which is indeed a bug. I don't know why I was thinking that. So, I just visited Zoho mail and opened any random email which contain images and saw that there is an image proxy. Sad! I just copy the image address and opened the URL in the next tab of my browser and the URL look like this…

Email Spoofing for Beginners

Hello Everyone,

Greetings to all,

In this article, I'll talk about email spoofing in a little depth.

So, First of all
What is Email Spoofing? 

If you already know about email spoofing then congratulations But don't worry if u don't know about email spoofing.

Email spoofing is a tactic used in phishing and spam campaigns because people are more likely to open an email when they think it has been sent by a legitimate source. It's not a new technique. It's a very old technique and still widely used in phishing and scamming.

This article is going to be interesting and I'll try to short this long article as much simple as possible.

Recently, my friend ask me
How it's possible to spoof an email?

So, there are a lot of questions related to this issue. 

When a Domain is Spoofable?

It is just as simple in an email as well because email protocols (SMTP) lack authentication. Anyone with a little basic knowledge can able to send an email with any sender’s address to anyone in …

DoS on WAF Protected Sites by Abusing Cookie

Hi Folks,

Today, I'm gonna share one of my interesting finding in bug bounty.
I occasionally hunt bugs in bug bounty in my free time. So, I don't have enough time to blog. But on someone request, I share some of my bug bounty findings here.
I like to find some interesting and logical bugs.
Recently, I found an interesting bug in many sites but I can't disclose the name of every website, one website 'Upwork' already patched this bug and resolved the report that's why I disclose the name.
So, what's the bug?
Denial of Service (DoS) > Single user cookie based DoS
There are a lot of websites using WAF like Cloudflare etc.
When the Cookie sets with malicious characters(like"><script> alert(1)</script> mean  with XSS or SQLI payloads etc.) value, the site WAF like Cloudflare block us from accessing that website, we need to remove that cookie to access the site

Many websites sets 'Referrer' value in a cookie.
So,  A little dirty trick comes to …