Skip to content

Instantly share code, notes, and snippets.

View aw-junaid's full-sized avatar
🐞
finding bugs.

Abdul Wahab Junaid aw-junaid

🐞
finding bugs.
View GitHub Profile
@aw-junaid
aw-junaid / sqlInjection.md
Created November 24, 2025 09:01
A SQL injection (SQLi) vulnerability is a web security flaw that enables an attacker to interfere with the queries an application makes to its database. It occurs when an application uses unsanitized user-supplied input to dynamically construct SQL queries, allowing malicious SQL code to be executed.

Finding a SQL Injection Vulnerability

Important Note: Always start with deliberately vulnerable applications like DVWA (Damn Vulnerable Web Application) or Web Security Academy before testing on real bug bounty programs.

Step 1: Map User Input Endpoints

Identify all locations where the application accepts user input:

Common SQLi injection points:

  • URL Parameters: GET /users?id=1

A Practical Walkthrough: Finding a CSRF Vulnerability

Let's imagine our target is a note-taking application: https://notes.example.com.

Step 1: Spot State-Changing Actions

You browse the application and identify actions that change data on the server. These are typically non-GET requests (POST, PUT, PATCH, DELETE).

Prime candidates on notes.example.com:

  • User Profile:
@aw-junaid
aw-junaid / clickjacking.md
Created November 23, 2025 13:25
Clickjacking is a malicious technique where a user is tricked into clicking something different from what they believe they are clicking. This is achieved by layering a transparent or invisible website element over a decoy page, which causes the user's click to perform an unintended action on the hidden, malicious site. Examples of this action i…

Finding a Clickjacking Vulnerability

Let's imagine our target is a social media site: https://socialapp.example.com.

Step 1: Spot State-Changing Actions

You browse the application and look for actions that change the state of your account or data and only require a single click (no text input, drag-and-drop, etc.).

Prime candidates on socialapp.example.com:

  • Profile Actions:
@aw-junaid
aw-junaid / openredirect.md
Created November 22, 2025 12:05
Open redirects are a great way to get started and understand how parameters work, and they can sometimes be the key to unlocking much more severe vulnerabilities.

A Practical Walkthrough: Finding an Open Redirect

Let's imagine our target is https://example.com.

Step 1: Search for Redirect URL Parameters

You're browsing example.com and notice that when you click the "Login" button, it takes you to a URL like: https://example.com/login?redirect=/dashboard

  • Analysis: The redirect parameter is a classic candidate. It tells the application where to send the user after a successful login. Other common parameter names include:
@aw-junaid
aw-junaid / xss.md
Created November 19, 2025 02:21
A Practical Walkthrough: Finding a Reflected XSS

A Practical Walkthrough: Finding a Reflected XSS

Let's imagine our target is a simple, hypothetical search page on a site like https://testbounty.example.com.


Step 1: Look for User Input Opportunities

You navigate the site and find a search feature at the top of the page. The URL looks like this after you search for "shoes": https://testbounty.example.com/search?query=shoes

@aw-junaid
aw-junaid / googledorking.md
Last active November 18, 2025 21:30
Google Dorking, also known as Google Hacking, is the practice of using advanced Google search operators to find specific information that isn't readily available through normal searches.
@aw-junaid
aw-junaid / 3d-model-sunlight-movement.ipynb
Created March 21, 2025 01:56
3D model Sunlight Movement
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@aw-junaid
aw-junaid / sierpi-ski-triangle.ipynb
Last active January 21, 2025 15:29
sierpi-ski-triangle.ipynb
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@aw-junaid
aw-junaid / mandelbrot-set.ipynb
Last active January 21, 2025 15:29
mandelbrot-set.ipynb
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@aw-junaid
aw-junaid / the-golden-rectangle.ipynb
Created January 10, 2025 02:37
The Golden Rectangle.ipynb
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.