My First Bounty Story$$$

--

Hello Hackers!!

Hope You’re fine & you’re family too…

Many of us always try to find those Bugs which is so common like XSS, IDOR, CSRF, etc. That’s why I want to share with you something. I believe in Manual Testing than Automation.

Introduction:-

Stored Link Hijacking

Description:-

When a company deletes their social media account they might forget to remove the link from their website. An attacker can create an account on the social media platform with that username and impersonate the company.

How I’m Able to find the BUG?

Step 1:- I Found some Social Media Link of the Target site.

Step 2:- When I click on Instagram Logo. Then I’ll be redirected into Target Instagram Profile.

Step 3:- Yeah the username is valid but the page isn’t available.

Now the question is coming out that what should an attacker do with the Target Company Using this BUG?

Step 1:- An Attacker Creates an Instagram profile using this Target Company username.

Step 2:- When any visitors click on Instagram logo they will be redirected into Attackers Profile.

IMPACT:-

An attacker can host any content and if he hosts any dirty content it will degrade the company’s FAME.

Thanks for taking the time to read my write-up!!!

Initial Severity When I reported P4

#Bug-Bounty #CyberSecurity #Bugcrowd

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Amit Kumar Biswas @Amitlt2
Amit Kumar Biswas @Amitlt2

Written by Amit Kumar Biswas @Amitlt2

Cyber Security Analyst at @avalanceGlobalSolutions | Security Researcher in | Cyber Security Researcher in Microsoft & Bugcrowd | R&D in Smart Contract |

Responses (2)

Write a response