#BugBountyTip did you know that the character '_' acts like the regex character '.' in SQL queries https://www.w3resource.com/sql/wildcards-like-operator/wildcards-underscore.php …
#bugbountytip It's possible to fire up "#OS #Command #Injection" instead of #XSS in Filename.PDF?parameter=PAYLOAD+|+Dir+c:\
#bugbountytips When you're trying to trigger a Command Injection flaw in #Python Web Application try to surround your payload with str() funciton i.e "%2bstr(__import.('os').system('whoami'))%2b"
Use Burp Intruder for Expression Language Injection and grep the response for 7744 :)
I found two SQL Injections tonight in private programs. One blind and the other hanging in plain sight. Here’s a tip. Wayback -> http://company.com -> grep | .php?id= and win #bugbountytip
Give this a try while testing for SQLi Authentication Bypass :
username: '--' / "--" password: '--' / "--"