Open in app

Sign In

Write

Sign In

Valeriy Shevchenko
Valeriy Shevchenko

1.4K Followers

Home

About

Jan 9

Hacking Hackers for fun and profit

This story will be in several parts. In each of the situations, I had to face unexpected results. By and large, these are stories that have arisen from the exploitation of the XSS vulnerability in wildlife. I hope you find something useful in these stories. Self XSS as a Critical Vulnerability Many of you know that…

Hacking

6 min read

Hacking Hackers for fun and profit
Hacking Hackers for fun and profit
Hacking

6 min read


Nov 19, 2021

How I accidentally hacked many companies using N/A vulnerability in Atlassian Cloud

Below you will learn in detail about the discovered vulnerability that allowed me to get about 15000$ in bounty with all secrets from the Atlassian cloud. This story happened about a year ago. And I did not publish it immediately for ethical reasons. It all started the day my friend…

Hacker

11 min read

How I accidentally hacked many companies using N/A vulnerability in Atlassian Cloud
How I accidentally hacked many companies using N/A vulnerability in Atlassian Cloud
Hacker

11 min read


Jul 13, 2021

Credential stuffing in Bug bounty hunting

Bug hunting is not always about looking for classic vulnerabilities (XSS, SQLi, SSRF, RCE, etc). Sometimes it is a search for a new problem domain. In this article, I will tell you how this not-so-standard approach to vulnerability searching helped me to find many critical problems. One evening I came…

Hacking

6 min read

Credential stuffing in Bug bounty hunting
Credential stuffing in Bug bounty hunting
Hacking

6 min read


Jan 7, 2021

$10,000 for a vulnerability that doesn’t exist

A couple of months ago, an interesting story happened to me. At that time I was working in a field not strongly connected with application security. And every month it became more and more obvious that something had to change. During the COVID-19 period, it was not very smart to…

Security

8 min read

$10,000 for a vulnerability that doesn’t exist
$10,000 for a vulnerability that doesn’t exist
Security

8 min read


Jun 3, 2020

From CRLF to Account Takeover

Many people don’t like client-side vulnerabilities. I’m not a fan of such vulnerabilities as well. And I try to spend less time searching for them. You can’t surprise anyone with endless alert-boxes on the pages. But sometimes these alerts boxes can be worth their weight in gold. Especially if the…

Hacking

7 min read

From CRLF to Account Takeover
From CRLF to Account Takeover
Hacking

7 min read


Published in InfoSec Write-ups

·Mar 9, 2020

Broke limited scope with a chain of bugs (tips for every rider CORS)

One morning, I was asked to participate in a private bug bounty program. In general, my experience in security is based on such private projects. This is good on the one hand, as there is almost no rush to find the most dangerous bug before the others. On the other…

Vulnerability

7 min read

Broke limited scope with a chain of bugs
Broke limited scope with a chain of bugs
Vulnerability

7 min read


Sep 2, 2019

Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet

An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol — or, more often, its successor, the Transport Layer Security (TLS) protocol — in standard web browsers to provide secure, remote-access VPN capability. SSL VPNs protect corporate assets from Internet exposure, but what…

VPN

5 min read

Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet
Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet
VPN

5 min read


Aug 19, 2019

Jenkins RCE PoC or simple pre-auth remote code execution on the Server.

Once upon a time, a friend of mine asked me a question — "Do you know any fresh RCE for the Jenkins environment ?". I was informed already about some old RCE PoC's but that was not what we need at that time. It was a fresh Jenkins environment. With…

Security

4 min read

Jenkins RCE PoC or simple pre-auth remote code execution on the Server.
Jenkins RCE PoC or simple pre-auth remote code execution on the Server.
Security

4 min read


Aug 9, 2019

Two Easy RCE in Atlassian Products

It was a long time from my last article. It was so many interesting results in my work. Seems that it's right time to share my knowledge and experience with you. But first, I wanna inform that two issues in that article well known. And both of that have CVE…

Security

4 min read

Two Easy RCE in Atlassian Products
Two Easy RCE in Atlassian Products
Security

4 min read


May 27, 2019

SSRF Vulnerability due to Sentry misconfiguration

That story happened when I saw that disclosed report. And funny thing is that I remembered that saw some Sentry requests in my BuprSuit Proxy in my current project. From that point of view, I highly recommend to not filtering Proxy history. …

Sentry

2 min read

SSRF Vulnerability due to Sentry misconfiguration
SSRF Vulnerability due to Sentry misconfiguration
Sentry

2 min read

Valeriy Shevchenko

Valeriy Shevchenko

1.4K Followers

I am a guy passionate about testing and security researching 👨‍💻 → t.me/valyaroller

Following
  • Knownsec 404 team

    Knownsec 404 team

  • Ozgur Alp

    Ozgur Alp

  • Ahmad A Abdulla

    Ahmad A Abdulla

  • Luke Berner

    Luke Berner

  • Omer Gil

    Omer Gil

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech