<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.cyberdiary.net/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.cyberdiary.net/feed.php">
        <title>Cybersecurity - tbhm</title>
        <description></description>
        <link>https://wiki.cyberdiary.net/</link>
        <image rdf:resource="https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-05-14T10:23:12+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:01_philosophy&amp;rev=1778747293&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:02_discovery&amp;rev=1778749890&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:03_mapping&amp;rev=1778747293&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:04_authorization&amp;rev=1778749157&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:05_xss&amp;rev=1778751741&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:06_sqli&amp;rev=1778749157&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:07_file_upload&amp;rev=1778747294&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:08_csrf&amp;rev=1778752228&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:09_privilege&amp;rev=1778747294&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:10_mobile&amp;rev=1778747294&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:11_auxiliary&amp;rev=1778747294&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:12_idor&amp;rev=1778752344&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:fast_checklist&amp;rev=1778747294&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:start&amp;rev=1778746729&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:test&amp;rev=1778746715&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=tbhm:v4&amp;rev=1778747294&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Cybersecurity</title>
        <link>https://wiki.cyberdiary.net/</link>
        <url>https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:01_philosophy&amp;rev=1778747293&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:28:13+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>01_philosophy</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:01_philosophy&amp;rev=1778747293&amp;do=diff</link>
        <description>Philosophy

Differences from standard testing

Single-sourced:

	*  looking mostly for common-ish vulns
	*  not competing with others
	*  incentivized for count
	*  payment guaranteed and quality check based on approximation

Crowdsourced:

	*  looking for vulns that aren't as easy to find</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:02_discovery&amp;rev=1778749890&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:11:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>02_discovery</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:02_discovery&amp;rev=1778749890&amp;do=diff</link>
        <description>Discovery

Find the road less traveled

This means find the application (or parts of an application) less tested. In wide scoped projects the flagship application will most liekly be heavily assessed.

	*  ^.acme.com scope is your friend
	*  Find domains via Google (and others!)</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:03_mapping&amp;rev=1778747293&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:28:13+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>03_mapping</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:03_mapping&amp;rev=1778747293&amp;do=diff</link>
        <description>Mapping

Mapping Tips:

	*  Google

   Smart Directory Brute Forcing

	*  RAFT lists (included in Seclists)
	*  SVN Digger (included in Seclists)
	*  Git Digger
	*  Platform Identification:
	*  Wapplyzer (Chrome)
	*  Builtwith (Chrome)
	*  retire.js (cmd-line or Burp)</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:04_authorization&amp;rev=1778749157&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:59:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>04_authorization</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:04_authorization&amp;rev=1778749157&amp;do=diff</link>
        <description>Auth and Session

Auth (better be quick)

Auth Related (more in logic, priv, and transport sections)

	*  User/pass discrepancy flaw
	*  Registration page harvesting
	*  Login page harvesting
	*  Password reset page harvesting
	*  No account lockout</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:05_xss&amp;rev=1778751741&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:42:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>05_xss</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:05_xss&amp;rev=1778751741&amp;do=diff</link>
        <description>Tactical Fuzzing - XSS

XSS

Core Idea: Does the page functionality display something to the users?
For time sensitive testing the 80/20 rule applies. Many testers use Polyglot payloads. You probably have too!

Multi-context, filter bypass based polyglot payload #1 (Rsnake XSS Cheat Sheet)</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:06_sqli&amp;rev=1778749157&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:59:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>06_sqli</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:06_sqli&amp;rev=1778749157&amp;do=diff</link>
        <description>Tactical Fuzzing - SQLi

SQL Injection

Core Idea: Does the page look like it might need to call on stored data?

There exist some SQLi polyglots, i.e (Mathias Karlsson):


SLEEP(1) /*' or SLEEP(1) or '&quot; or SLEEP(1) or &quot;*/


Works in single quote context, works in double quote context, works in</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:07_file_upload&amp;rev=1778747294&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:28:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>07_file_upload</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:07_file_upload&amp;rev=1778747294&amp;do=diff</link>
        <description>Tactical Fuzzing - FI &amp; Uploads

Local file inclusion

Core Idea: Does it (or can it) interact with the server file system?

Liffy is new and cool here but you can also use Seclists.

Malicious File Upload

This is an important and common attack vector in this type of testing.
A file upload functions need a lot of protections to be adequately secure.</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:08_csrf&amp;rev=1778752228&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:50:28+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>08_csrf</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:08_csrf&amp;rev=1778752228&amp;do=diff</link>
        <description>CSRF Testing

Testing CSRF On Application

	*  CSRF Normal
	*  Change Method To GET-Based
	*  Change Value Of CSRF-Token To undefined
	*  Delete CSRF Token Value Or Delete Token Parameter
	*  Use The same CSRF Value In Different Accounts
	*  Replace Value CSRF Token with Same Length Characters</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:09_privilege&amp;rev=1778747294&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:28:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>09_privilege</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:09_privilege&amp;rev=1778747294&amp;do=diff</link>
        <description>Privilege, Transport, Logic

Privilege

Often logic, priv, auth bugs are blurred.

Testing user priv:

	*  admin has power
	*  peon has none
	*  peon can use function only meant for admin

More Privilege

	*  Find site functionality that is restricted to certain user types</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:10_mobile&amp;rev=1778747294&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:28:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>10_mobile</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:10_mobile&amp;rev=1778747294&amp;do=diff</link>
        <description>Mobile

Data Storage

Its common to see mobile apps not applying encryption to the files that store PII.

Common places to find PII unencrypted

	*  Phone system logs (avail to all apps)
	*  webkit cache (cache.db)
	*  plists, dbs, etc
	*  hardcoded in the binary</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:11_auxiliary&amp;rev=1778747294&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:28:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>11_auxiliary</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:11_auxiliary&amp;rev=1778747294&amp;do=diff</link>
        <description>Auxiliary

The vulns formerly known as &quot;noise&quot;

	*  Content Spoofing or HTML injection
	*  Referer leakage
	*  security headers
	*  path disclosure
	*  clickjacking
	*  ++

How to test a web app in n minutes

How can you get maximum results within a given time window?</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:12_idor&amp;rev=1778752344&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:52:24+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>12_idor</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:12_idor&amp;rev=1778752344&amp;do=diff</link>
        <description>Insecure Direct Object References

IDOR Overview

To be continued...

Zseano IDOR Additions

	*  Try integers even when you see GUIDs -- server may accept both formats
	*  Inject “id”:“1” into JSON POST bodies even when not normally present
	*</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:fast_checklist&amp;rev=1778747294&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:28:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>fast_checklist</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:fast_checklist&amp;rev=1778747294&amp;do=diff</link>
        <description># Fast Testing Checklist

A combination of my own methodology and the Web Application Hacker's Handbook Task checklist.

Contents

- App Recon and analysis
- Test handling of access
- Test handling of input
- Test application logic
- Assess application hosting
- Miscellaneous tests</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:start&amp;rev=1778746729&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:18:49+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>start</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:start&amp;rev=1778746729&amp;do=diff</link>
        <description>The Bug Hunter's Methodology (TBHM)

A comprehensive methodology for web application bug bounty hunting, based on Jason Haddix's Bug Hunter's Methodology.

Chapters

	*  01 - Philosophy - Mindset, differences from standard testing, report writing tips
	*  02 - Discovery - Finding the road less traveled, recon tools, port scanning</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:test&amp;rev=1778746715&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:18:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>test</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:test&amp;rev=1778746715&amp;do=diff</link>
        <description>test content</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=tbhm:v4&amp;rev=1778747294&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:28:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>v4</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=tbhm:v4&amp;rev=1778747294&amp;do=diff</link>
        <description># TBHM v4

## New Files from v4

Content from the v4 update of The Bug Hunter's Methodology.

(Additional content to be added as v4 materials are released.)</description>
    </item>
</rdf:RDF>
