<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.cyberdiary.net/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.cyberdiary.net/feed.php">
        <title>Cybersecurity</title>
        <description></description>
        <link>https://wiki.cyberdiary.net/</link>
        <image rdf:resource="https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-05-14T09:43:07+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:05_xss&amp;rev=1778751741&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=start&amp;rev=1778751200&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:02_discovery&amp;rev=1778749890&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=bbc:04_env_setup&amp;rev=1778749890&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=bbc:03_how_internet_works&amp;rev=1778749890&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=bbc:02_sustaining_success&amp;rev=1778749508&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=bbc:01_picking_program&amp;rev=1778749508&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=all_articles&amp;rev=1778749205&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:12_idor&amp;rev=1778749158&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:04_authorization&amp;rev=1778749157&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:06_sqli&amp;rev=1778749157&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:08_csrf&amp;rev=1778749157&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:reporting&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:escalation&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:feature_checklist&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:logic_bugs&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:auth_session&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:cors&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:sqli&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:idor&amp;rev=1778749098&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Cybersecurity</title>
        <link>https://wiki.cyberdiary.net/</link>
        <url>https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:05_xss&amp;rev=1778751741&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:42:21+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>05_xss - fix // in inline code breaking italic parser</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:05_xss&amp;rev=1778751741&amp;do=diff</link>
        <description>Tactical Fuzzing - XSS

XSS

Core Idea: Does the page functionality display something to the users?
For time sensitive testing the 80/20 rule applies. Many testers use Polyglot payloads. You probably have too!

Multi-context, filter bypass based polyglot payload #1 (Rsnake XSS Cheat Sheet)</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=start&amp;rev=1778751200&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:33:20+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>start</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=start&amp;rev=1778751200&amp;do=diff</link>
        <description>Wiki

Welcome to the knowledge base.

TBHM Chapters

	*  01 - Philosophy &amp; Mindset
	*  02 - Discovery &amp; Recon
	*  03 - Mapping the Attack Surface
	*  04 - Authorization &amp; Session Management
	*  05 - Cross-Site Scripting (XSS)
	*  06 - SQL Injection
	*  07 - File Upload Vulnerabilities
	*  08 - CSRF
	*  09 - Privilege Escalation, Logic &amp; Transport
	*  10 - Mobile Testing
	*  11 - Auxiliary Info &amp; Tools
	*  12 - IDOR
	*  Fast Testing Checklist

Quick Reference

	*  TBHM Index
	*  Fast Checklist
	*…</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:02_discovery&amp;rev=1778749890&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:11:30+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>02_discovery - merge bbc ch5 recon techniques</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:02_discovery&amp;rev=1778749890&amp;do=diff</link>
        <description>Discovery

Find the road less traveled

This means find the application (or parts of an application) less tested. In wide scoped projects the flagship application will most liekly be heavily assessed.

	*  ^.acme.com scope is your friend
	*  Find domains via Google (and others!)</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=bbc:04_env_setup&amp;rev=1778749890&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:11:30+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>04_env_setup - bbc article -- updated with full content</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=bbc:04_env_setup&amp;rev=1778749890&amp;do=diff</link>
        <description>Ch 4: Environmental Setup and Traffic Interception

Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)

OS

Use a Unix-based system. Kali Linux is recommended -- it ships with Burp Suite, Gobuster, DirBuster, Wfuzz, and other tools. macOS also works fine.</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=bbc:03_how_internet_works&amp;rev=1778749890&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:11:30+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>03_how_internet_works - bbc article -- updated with full content</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=bbc:03_how_internet_works&amp;rev=1778749890&amp;do=diff</link>
        <description>Ch 3: How the Internet Works

Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)

Client-Server Model

Web apps operate on a client-server model. The client (browser) sends HTTP requests; the server processes them and returns responses.</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=bbc:02_sustaining_success&amp;rev=1778749508&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:05:08+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>02_sustaining_success - bbc article from bug bounty bootcamp</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=bbc:02_sustaining_success&amp;rev=1778749508&amp;do=diff</link>
        <description>Ch 2: Sustaining Your Success

Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)

Writing Good Reports

A report is how you get paid and build reputation. Bad writing = low payouts + duplicates marked invalid.

8-step report structure:</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=bbc:01_picking_program&amp;rev=1778749508&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:05:08+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>01_picking_program - bbc article from bug bounty bootcamp</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=bbc:01_picking_program&amp;rev=1778749508&amp;do=diff</link>
        <description>Ch 1: Picking a Bug Bounty Program

Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)

Asset Types

Bug bounty programs define scope by listing assets -- the systems you are authorized to test.

	*  Social targets -- Twitter/Facebook/LinkedIn pages. Usually out-of-scope because you can't control what users post.</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=all_articles&amp;rev=1778749205&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:00:05+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>all_articles - create full article index</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=all_articles&amp;rev=1778749205&amp;do=diff</link>
        <description>All Articles

Complete index of every page on this wiki.

The Bug Hunter's Methodology (TBHM)

	*  01 - Philosophy &amp; Mindset
	*  02 - Discovery &amp; Recon
	*  03 - Mapping the Attack Surface
	*  04 - Authorization &amp; Session
	*  05 - Cross-Site Scripting (XSS)
	*  06 - SQL Injection
	*  07 - File Upload
	*  08 - CSRF
	*  09 - Privilege, Logic &amp; Transport
	*  10 - Mobile Testing
	*  11 - Auxiliary Info &amp; Tools
	*  12 - IDOR
	*  Fast Testing Checklist
	*  TBHM Index
	*  Test Page
	*  TBHM v4

Zseano's…</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:12_idor&amp;rev=1778749158&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:59:18+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>12_idor - integrate zseano methodology</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:12_idor&amp;rev=1778749158&amp;do=diff</link>
        <description>Insecure Direct Object References

IDOR Overview

To be continued...

Zseano IDOR Additions

	*  Try integers even when you see GUIDs -- server may accept both formats
	*  Inject “id”:“1” into JSON POST bodies even when not normally present
	*</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:04_authorization&amp;rev=1778749157&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:59:17+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>04_authorization - integrate zseano methodology</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:04_authorization&amp;rev=1778749157&amp;do=diff</link>
        <description>Auth and Session

Auth (better be quick)

Auth Related (more in logic, priv, and transport sections)

	*  User/pass discrepancy flaw
	*  Registration page harvesting
	*  Login page harvesting
	*  Password reset page harvesting
	*  No account lockout</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:06_sqli&amp;rev=1778749157&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:59:17+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>06_sqli - integrate zseano methodology</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:06_sqli&amp;rev=1778749157&amp;do=diff</link>
        <description>Tactical Fuzzing - SQLi

SQL Injection

Core Idea: Does the page look like it might need to call on stored data?

There exist some SQLi polyglots, i.e (Mathias Karlsson):


SLEEP(1) /*' or SLEEP(1) or '&quot; or SLEEP(1) or &quot;*/


Works in single quote context, works in double quote context, works in</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:08_csrf&amp;rev=1778749157&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:59:17+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>08_csrf - integrate zseano methodology</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:08_csrf&amp;rev=1778749157&amp;do=diff</link>
        <description>CSRF Testing

Testing CSRF On Application

	*  CSRF Normal
	*  Change Method To GET-Based
	*  Change Value Of CSRF-Token To undefined
	*  Delete CSRF Token Value Or Delete Token Parameter
	*  Use The same CSRF Value In Different Accounts
	*  Replace Value CSRF Token with Same Length Characters</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:reporting&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>reporting - add zseano methodology article</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:reporting&amp;rev=1778749098&amp;do=diff</link>
        <description>Writing Good Reports

A good report is what separates a bounty from a duplicate or a N/A. Good reports build reputation and get private invites.

Report Structure

Title: [Bug Type] on [Feature/Endpoint] leads to [Impact]

Examples:

	*  “Stored XSS in profile bio via unsanitized &lt;script&gt; tag leads to account takeover</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:escalation&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>escalation - add zseano methodology article</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:escalation&amp;rev=1778749098&amp;do=diff</link>
        <description>Bug Chaining &amp; Escalation

Individual low/medium bugs often chain together into critical impact. Always ask: can this go further?

Common Chains
 Chain  Result  Open Redirect + OAuth  Token theft = account takeover  Self-XSS + CSRF  Stored XSS affecting other users</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:feature_checklist&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>feature_checklist - add zseano methodology article</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:feature_checklist&amp;rev=1778749098&amp;do=diff</link>
        <description>Feature Testing Checklist

Test these feature areas on every program. Each has common recurring vulnerabilities.

Registration

	*  What info is required? Where is it reflected after signup?
	*  What characters are allowed? &lt; &gt; “ '\ in name fields?</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:logic_bugs&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>logic_bugs - add zseano methodology article</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:logic_bugs&amp;rev=1778749098&amp;do=diff</link>
        <description>Business Logic &amp; Privilege Escalation

Logic bugs require understanding how the app should work, then breaking that assumption.

Mindset

	*  Understand the intended workflow first
	*  Ask: what is the developer assuming the user will always do?
	*  Break those assumptions</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:auth_session&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>auth_session - add zseano methodology article</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:auth_session&amp;rev=1778749098&amp;do=diff</link>
        <description>Auth &amp; Session Bugs

Authentication and session management flaws that lead to account takeover.

Authentication Flaws

	*  User/pass discrepancy -- different error messages for wrong username vs wrong password = username enumeration
	*  No account lockout</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:cors&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>cors - add zseano methodology article</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:cors&amp;rev=1778749098&amp;do=diff</link>
        <description>CORS Misconfiguration

Misconfigured CORS allows attacker-controlled sites to make credentialed requests to the target.

Testing

Add an Origin header to every interesting request:


Origin: https://attacker.com
Origin: https://anythinghere-target.com
Origin: null</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:sqli&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>sqli - add zseano methodology article</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:sqli&amp;rev=1778749098&amp;do=diff</link>
        <description>SQL Injection

Legacy code and APIs are most vulnerable. Blind/time-based is most common in the wild.

Detection

Time-based payloads work when error messages are disabled (most common case):


' or sleep(15) and 1=1#
' or sleep(15)#
' union select sleep(15),null#
'%2Bbenchmark(3200,SHA1(1))%2B'
'+BENCHMARK(40000000,SHA1(1337))+'</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:idor&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>drew (drew@undisclosed.example.com)</dc:creator>
        <title>idor - add zseano methodology article</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:idor&amp;rev=1778749098&amp;do=diff</link>
        <description>IDOR Testing

Insecure Direct Object Reference: access resources belonging to other users by manipulating IDs.

Core Technique

	*  Change integer IDs: api/user/1 to api/user/2
	*  Try integers even when you see GUIDs or hashed IDs -- server may accept both</description>
    </item>
</rdf:RDF>
