Open in app

Sign In

Write

Sign In

YoKo Kho
YoKo Kho

906 Followers

Home

About

Published in InfoSec Write-ups

·Mar 14, 2022

From Recon via Censys and DNSdumpster, to Getting P1 by Login Using Weak Password — “password”

A simple story when Allah allowed me to get P1 by combining several issues, one of which was related to “weak credentials”. — بسم الله الرحمن الرحيم Mirroring from: http://www.firstsight.me/2022/03/from-recon-via-censys-and-dnsdumpster-to-getting-p1-by-login-using-weak-password-password/ As usual, I will try to release this write-up with two different approaches, which are: For those who only need the main points of this finding (InshaAllah it can saves tons of minutes if readers understand every flow already) — please kindly see…

Password

13 min read

From Recon via Censys and DNSdumpster, to Getting P1 by Login Using Weak Password — “password”
From Recon via Censys and DNSdumpster, to Getting P1 by Login Using Weak Password — “password”
Password

13 min read


Published in InfoSec Write-ups

·Nov 14, 2020

Optimizing Hunting Results in VDP for use in Bug Bounty Programs — From Sensitive Information Disclosure to Accessing Hidden APIs which can be used to Retrieve Customer Data

A story when Allah willed me to tried to optimize my findings in the Points-Only program to be able to get 6 paid P1 issues in the bounty program. — بسم الله الرحمن الرحيم Mirroring from: http://www.firstsight.me/2020/11/optimizing-hunting-results-in-vdp-for-use-in-bug-bounty-programs---from-sensitive-information-disclosure-to-accessing-hidden-apis-which-can-be-used-to-retrieve-customer-data/ As usual, I will try to release this write-up with two different approaches, which are:

Bug Bounty

24 min read

Optimizing Hunting Results in VDP for use in Bug Bounty Programs — From Sensitive Information…
Optimizing Hunting Results in VDP for use in Bug Bounty Programs — From Sensitive Information…
Bug Bounty

24 min read


Published in InfoSec Write-ups

·Jun 23, 2020

From Recon to Bypassing MFA Implementation in OWA by Using EWS Misconfiguration

A story about how I Finally could use an AD account that unenrolled to MFA, by using an EWS Misconfiguration to Access Email Inbox and (Having the Ability) to Dump the Global Address List. — بسم الله الرحمن الرحيم Mirroring from: http://www.firstsight.me/2020/06/from-recon-to-bypassing-mfa-implementation-in-owa-by-using-ews-misconfiguration/ Note: I want to thank (again) Th3g3nt3lman for his talks about Github Recon and Sensitive Data Exposure. I use it as a way to find the AD credentials.

Github Recon

15 min read

From Recon to Bypassing MFA Implementation in OWA by Using EWS Misconfiguration
From Recon to Bypassing MFA Implementation in OWA by Using EWS Misconfiguration
Github Recon

15 min read


Published in InfoSec Write-ups

·Jun 6, 2020

From 3,99 to 1,650 USD (Part I) — Simple Vertical Privilege Escalation by Changing HTTP Response

A story about how I got several simple bugs (1 P2, 1 P3, and 2 P4s) on a target (that just allow Specific Country Code to Register) by using Premium Phone Number. — بسم الله الرحمن الرحيم Mirroring from: http://www.firstsight.me/2020/06/from-399-to-1650-usd-part-i-simple-vertical-privilege-escalation-by-changing-http-response/ As usual, I will try to release this article with two different approaches, which are:

Privilege Escalation

11 min read

From 3,99 to 1,650 USD (Part I) — Simple Vertical Privilege Escalation by Changing HTTP Response
From 3,99 to 1,650 USD (Part I) — Simple Vertical Privilege Escalation by Changing HTTP Response
Privilege Escalation

11 min read


Published in InfoSec Write-ups

·Feb 18, 2020

From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World

How I Finally could Got into an Internal Network (and could accessing all of their internal assets) by Using Various Vulnerabilities. — بسم الله الرحمن الرحيم Mirroring from: http://www.firstsight.me/2020/02/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-world/ Here is a little story about how I finally could got into an internal network (and could accessing all of their internal assets) at one of the biggest ICT company in the world by using various vulnerabilities (from sensitive data exposure, miss-configuration, until…

Bug Bounty

21 min read

From Recon to Optimizing RCE Results — Simple Story with One of the Biggest ICT Company in the…
From Recon to Optimizing RCE Results — Simple Story with One of the Biggest ICT Company in the…
Bug Bounty

21 min read


Published in InfoSec Write-ups

·Oct 29, 2019

5,000 USD XSS Issue at Avast Desktop AntiVirus for Windows (Yes, Desktop!)

CVE-2019–18653 & CVE-2019–18654: The story when Reflected XSS was triggered from the SSID Name (It also affected AVG AntiVirus because basically the product codes were mostly “merged”). — بسم الله الرحمن الرحيم So, this article will be explained in two ways, which are the one that tells how I got it and the one that tries to explain the basic and reference. Readers could also read the TL;DR section directly.

Bug Bounty

9 min read

5,000 USD XSS Issue at Avast Desktop AntiVirus for Windows (Yes, Desktop!)
5,000 USD XSS Issue at Avast Desktop AntiVirus for Windows (Yes, Desktop!)
Bug Bounty

9 min read


Published in InfoSec Write-ups

·Oct 26, 2019

Illegal Rendered at Download Feature in Several Apps (including Opera Mini) that Lead to Extension Manipulation (with RTLO)

The story of when you download a file that looks “legitimate”, but changes when you run the file. — بسم الله الرحمن الرحيم Update I (Jan 21st, 2020): Opera has replied the email and acknowledged the reported issue. On that occasion, Opera also apologized for the delay in their response. Update II (Feb 27th, 2020): Opera notifies if Opera Mini 47 has been released and is being rolled out…

Rtlo

9 min read

Illegal Rendered at Download Feature in Opera Mini that Lead to Extension Manipulation (with RTLO)
Illegal Rendered at Download Feature in Opera Mini that Lead to Extension Manipulation (with RTLO)
Rtlo

9 min read


Published in InfoSec Write-ups

·Sep 23, 2019

Information Disclosure at PayPal and Xoom (PayPal Acquisition) via Simple Google Dork - 1,000 USD

بسم الله الرحمن الرحيم (This is a 2017 article that has been released at my personal blog). I. ABSTRACT We can’t deny if one of the biggest dream for everyone that has so many contents at their site is to be indexed at top search engine in the world. In reality, we…

8 min read

Information Disclosure at PayPal and Xoom (PayPal Acquisition) via Simple Google Dork - 1,000 USD
Information Disclosure at PayPal and Xoom (PayPal Acquisition) via Simple Google Dork - 1,000 USD

8 min read


Published in InfoSec Write-ups

·Sep 14, 2019

Race Condition that could Result to RCE - (A story with an App that temporary stored an uploaded file within 2 seconds before moving it to Amazon S3)

بسم الله الرحمن الرحيم - Part I from (hopefully) IV Parts - Update I: Added a “Reference” Section. Update II: “We” at this series of article will refer to Faisal Yudo Hernawan, Tomi, and Me. Update III: The way to exploiting the “upload.php” function has been released at Tomi’s write-up…

Bug Bounty

9 min read

Race Condition that could Result to RCE - (A story with an App that temporary stored an uploaded…
Race Condition that could Result to RCE - (A story with an App that temporary stored an uploaded…
Bug Bounty

9 min read


Mar 27, 2019

Tips Menulis Laporan Kerentanan (Bug Hunting Point of View) — Part I

بسم الله الرحمن الرحيم Laporan merupakan suatu hal yang terbilang penting ketika seorang penguji hendak menyampaikan suatu kerentanan baik ketika berpartisipasi di dalam suatu program bug hunting maupun di tingkat pekerjaan yang lebih formal seperti Penetration Test dan semacamnya. Informasi mengenai fungsi dari suatu fitur berikut dengan letak permasalahan (kerentanan)…

Bug Bounty

20 min read

Tips Menulis Laporan Kerentanan (Bug Hunting Point of View) — Part I
Tips Menulis Laporan Kerentanan (Bug Hunting Point of View) — Part I
Bug Bounty

20 min read

YoKo Kho

YoKo Kho

906 Followers

PartTime Bug Hunter | OSCP, eWPTX | https://twitter.com/YoKoAcc | https://bugcrowd.com/YokoKho | https://leanpub.com/bughunting101 (Bahasa) Free!

Following
  • Zulfiazhari

    Zulfiazhari

  • Habibie Faried

    Habibie Faried

  • David Gilbertson

    David Gilbertson

  • Jonathan Bouman

    Jonathan Bouman

  • Mario

    Mario

See all (21)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech