<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.cyberdiary.net/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.cyberdiary.net/feed.php">
        <title>Cybersecurity - zseano</title>
        <description></description>
        <link>https://wiki.cyberdiary.net/</link>
        <image rdf:resource="https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-05-14T10:56:53+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:auth_session&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:cors&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:csrf&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:escalation&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:feature_checklist&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:file_uploads&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:idor&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:logic_bugs&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:open_redirects&amp;rev=1778751983&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:philosophy&amp;rev=1778749097&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:program_selection&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:recon&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:reporting&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:sqli&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:ssrf&amp;rev=1778749098&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:start&amp;rev=1778749097&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:toolkit&amp;rev=1778749097&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=zseano:xss&amp;rev=1778749098&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Cybersecurity</title>
        <link>https://wiki.cyberdiary.net/</link>
        <url>https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:auth_session&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>auth_session</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:auth_session&amp;rev=1778749098&amp;do=diff</link>
        <description>Auth &amp; Session Bugs

Authentication and session management flaws that lead to account takeover.

Authentication Flaws

	*  User/pass discrepancy -- different error messages for wrong username vs wrong password = username enumeration
	*  No account lockout</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:cors&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>cors</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:cors&amp;rev=1778749098&amp;do=diff</link>
        <description>CORS Misconfiguration

Misconfigured CORS allows attacker-controlled sites to make credentialed requests to the target.

Testing

Add an Origin header to every interesting request:


Origin: https://attacker.com
Origin: https://anythinghere-target.com
Origin: null</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:csrf&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>csrf</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:csrf&amp;rev=1778749098&amp;do=diff</link>
        <description>CSRF Testing

Find areas that should have CSRF protection and test if it's actually enforced.

8-Step Test

	*  Standard CSRF test -- remove the token entirely
	*  Change method to GET
	*  Change CSRF token value to undefined
	*  Delete CSRF token value or entire parameter</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:escalation&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>escalation</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:escalation&amp;rev=1778749098&amp;do=diff</link>
        <description>Bug Chaining &amp; Escalation

Individual low/medium bugs often chain together into critical impact. Always ask: can this go further?

Common Chains
 Chain  Result  Open Redirect + OAuth  Token theft = account takeover  Self-XSS + CSRF  Stored XSS affecting other users</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:feature_checklist&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>feature_checklist</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:feature_checklist&amp;rev=1778749098&amp;do=diff</link>
        <description>Feature Testing Checklist

Test these feature areas on every program. Each has common recurring vulnerabilities.

Registration

	*  What info is required? Where is it reflected after signup?
	*  What characters are allowed? &lt; &gt; “ '\ in name fields?</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:file_uploads&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>file_uploads</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:file_uploads&amp;rev=1778749098&amp;do=diff</link>
        <description>File Upload Testing

File uploads are often filtered on extension, content-type, magic bytes, or image dimensions. Test each layer separately.

Extension Tricks


shell.php/.jpg          # server may strip after slash
shell.html%0d%0a.jpg    # newline truncation
.txt, .svg, .xml        # often forgotten in filters
shell.php5, shell.phtml # alternate PHP extensions</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:idor&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>idor</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:idor&amp;rev=1778749098&amp;do=diff</link>
        <description>IDOR Testing

Insecure Direct Object Reference: access resources belonging to other users by manipulating IDs.

Core Technique

	*  Change integer IDs: api/user/1 to api/user/2
	*  Try integers even when you see GUIDs or hashed IDs -- server may accept both</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:logic_bugs&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>logic_bugs</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:logic_bugs&amp;rev=1778749098&amp;do=diff</link>
        <description>Business Logic &amp; Privilege Escalation

Logic bugs require understanding how the app should work, then breaking that assumption.

Mindset

	*  Understand the intended workflow first
	*  Ask: what is the developer assuming the user will always do?
	*  Break those assumptions</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:open_redirects&amp;rev=1778751983&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:46:23+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>open_redirects</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:open_redirects&amp;rev=1778751983&amp;do=diff</link>
        <description>Open Redirect Testing

Very easy to find, and chains effectively with OAuth for token theft leading to account takeover.

Common Parameter Names


return, return_url, rUrl, cancelUrl, redirect, goto, returnTo, returnUrl,
r_url, redirectTo, redirectUrl, dest, continue, next, window, back</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:philosophy&amp;rev=1778749097&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>philosophy</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:philosophy&amp;rev=1778749097&amp;do=diff</link>
        <description>Philosophy &amp; Core Principles

The foundation of zseano's approach: go deep, not wide. One program for months, not ten programs for days.

Core Mindset

	*  Spend months on the same program -- dive deep
	*  Reverse engineer the developer's thought process</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:program_selection&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>program_selection</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:program_selection&amp;rev=1778749098&amp;do=diff</link>
        <description>Picking a Program

Choosing the right target is as important as the testing itself.

What to Look For

	*  Wide scope -- bigger company = more teams = more mistakes
	*  Well-known names -- more surface area, more legacy code
	*  Plan to spend months, not days</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:recon&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>recon</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:recon&amp;rev=1778749098&amp;do=diff</link>
        <description>Recon &amp; Expanding Attack Surface

Run recon while doing manual testing in parallel. Don't wait for tools to finish before hacking.

Pre-Hack Research

Before touching the site:

	*  Search for disclosed bugs: site:google.com “domain.com” vulnerability</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:reporting&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>reporting</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:reporting&amp;rev=1778749098&amp;do=diff</link>
        <description>Writing Good Reports

A good report is what separates a bounty from a duplicate or a N/A. Good reports build reputation and get private invites.

Report Structure

Title: [Bug Type] on [Feature/Endpoint] leads to [Impact]

Examples:

	*  “Stored XSS in profile bio via unsanitized &lt;script&gt; tag leads to account takeover</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:sqli&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>sqli</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:sqli&amp;rev=1778749098&amp;do=diff</link>
        <description>SQL Injection

Legacy code and APIs are most vulnerable. Blind/time-based is most common in the wild.

Detection

Time-based payloads work when error messages are disabled (most common case):


' or sleep(15) and 1=1#
' or sleep(15)#
' union select sleep(15),null#
'%2Bbenchmark(3200,SHA1(1))%2B'
'+BENCHMARK(40000000,SHA1(1337))+'</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:ssrf&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ssrf</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:ssrf&amp;rev=1778749098&amp;do=diff</link>
        <description>SSRF Testing

Server-Side Request Forgery: trick the server into making requests to internal/cloud resources.

Where to Look

	*  Features that take a URL parameter -- API consoles, webhooks, developer tools
	*  Import from URL features
	*  PDF/screenshot generators</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:start&amp;rev=1778749097&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>start</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:start&amp;rev=1778749097&amp;do=diff</link>
        <description>Zseano's Methodology

Based on Sean Roesner's bug bounty methodology (bugbountyhunter.com), combined with drew's personal notes.

Chapters

	*  Philosophy &amp; Core Principles
	*  Toolkit &amp; Setup
	*  Picking a Program
	*  Recon &amp; Expanding Attack Surface
	*  Feature Testing Checklist
	*  XSS Testing
	*  CSRF Testing
	*  Open Redirects
	*  SSRF Testing
	*  File Upload Testing
	*  IDOR Testing
	*  SQL Injection
	*  CORS Misconfiguration
	*  Auth &amp; Session Bugs
	*  Business Logic &amp; Privilege Escalatio…</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:toolkit&amp;rev=1778749097&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>toolkit</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:toolkit&amp;rev=1778749097&amp;do=diff</link>
        <description>Toolkit &amp; Setup

Tools used in the zseano/drew combined methodology.

Recon Tools
 Tool  Purpose  Command  amass  subdomain enumeration  amass enum -brute -active -d domain.com -o amass-output.txt  subfinder  passive subdomain enum  subfinder -d domain.com -o subs.txt</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=zseano:xss&amp;rev=1778749098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T08:58:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>xss</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=zseano:xss&amp;rev=1778749098&amp;do=diff</link>
        <description>XSS Testing

Cross-site scripting is high-frequency, chains well with CSRF and IDOR, and is worth testing on every input.

Testing Process

	*  Test basic HTML injection -- can you input &lt;h2&gt;, &lt;img&gt;, &lt;table&gt; without filtering?
	*  Check encoding -- reflected as</description>
    </item>
</rdf:RDF>
