Open in app

Sign In

Write

Sign In

Sahil Tikoo
Sahil Tikoo

146 Followers

Home

About

Jul 8, 2020

From N/A to Resolved For BackBlaze Android App[Hackerone Platform] Bucket Takeover

Hello Everyone Why I wrote this Blog? This blog will help you understand the importance of never giving up and how you can turn things around in bug bounty. Few weeks back I was looking for some programs to hunt ,stumbled upon this Public backblaze program which already had around…

Bug Bounty

4 min read

From N/A to Resolved For BackBlaze Android App[Hackerone Platform] Bucket Takeover
From N/A to Resolved For BackBlaze Android App[Hackerone Platform] Bucket Takeover
Bug Bounty

4 min read


Apr 3, 2020

Touch ID Authentication Bypass on Evernote and Dropbox IOS Apps

This blog will walk you through the technique that I used to bypass Touch ID authentication feature implemented on the Login Page in Evernote and Dropbox IOS apps. Just Before Getting Started, I will list down the tools that were used in this process: Iphone 6S with ios 13.3.1 Checkra1n…

Pentesting

6 min read

Touch ID Authentication Bypass on Evernote and Dropbox IOS Apps
Touch ID Authentication Bypass on Evernote and Dropbox IOS Apps
Pentesting

6 min read


Feb 9, 2019

Setting Up Gitrob and using it to find Leaking Repository of an Employee in a hackerone private program.

The only reason I am blogging about this finding is to help guys who are facing difficulty in setting up Gitrob since it has been rewritten in Go and not many people out there are familiar with go.So, lets begin: Few days back I got a private invite on hackerone…

Golang

4 min read

Setting Up Gitrob and using it to find Leaking Repository of an Employee in a hackerone private…
Setting Up Gitrob and using it to find Leaking Repository of an Employee in a hackerone private…
Golang

4 min read


Dec 30, 2018

Bypassing Access Control in a Program on Hackerone !!

This blog is about a vulnerability that I found in a program on hackerone i.e. Wakatime.It is a platform for developers and has an active bug bounty program on hackerone. I decided to write a blogpost on this bug because I think this test case I used in finding the…

Security

3 min read

Bypassing Access Control in a Program on Hackerone !!
Bypassing Access Control in a Program on Hackerone !!
Security

3 min read


Oct 3, 2018

Demystifying the working of Tor and Deploying your own Hidden Service.

Hey Everyone, this blog will help you in understanding the basics about how to setup your own hidden service on Tor network.Before going through the actual procedure let’s first try to get a brief understanding of how the Onion routing in Tor browser or Onion Proxy works. Tor Browser as…

Privacy

6 min read

Demystifying the working of Tor and Deploying your own Hidden Service.
Demystifying the working of Tor and Deploying your own Hidden Service.
Privacy

6 min read


Aug 14, 2018

Defending Against Practical Web-Cache Poisoning Attacks.

Overview Few days back I read this blog by James Kettle(https://portswigger.net/blog/practical-web-cache-poisoning),as per his blog various Companies that have a website hosted on a web server generally use softwares like Varnish for cache control purposes.Even CDN’s like fastly or Heroku use Varnish for maintaining cache. So,How this cache thing works?When I read…

Web Development

5 min read

Defending Against Practical Web-Cache Poisoning Attacks.
Defending Against Practical Web-Cache Poisoning Attacks.
Web Development

5 min read


Apr 26, 2018

Developing an Automated Tool{PortWitness} using Bash Scripting for OSINT

Today I would like to share my work on how i automate my tasks using bash scripting for Web app pentesting.One month back I saw this tool on my twitter feed named as “Eyewitness”, this tool could be used to get information about whether Multiple sub-domains of a particular Domain…

Hacking

6 min read

Developing an Automated Tool{PortWitness} using Bash Scripting for OSINT
Developing an Automated Tool{PortWitness} using Bash Scripting for OSINT
Hacking

6 min read


Jan 26, 2018

JSON CSRF attack on a Social Networking Site[Hackerone Platform]

JSON CSRF attack on a Social Networking Site[Hackerone Platform] Before describing the actual attack scenario let us first discuss what is CSRF attack ? Basically lets consider Victim has an active session on a website and lets say victim has some details in his/her settings page on that website …

Csrf

3 min read

JSON CSRF attack on a Social Networking Site[Hackerone Platform]
JSON CSRF attack on a Social Networking Site[Hackerone Platform]
Csrf

3 min read


Jan 23, 2018

Exploitation of Google Open redirects using BeEF[Browser exploitation framework]

One year back when i was hunting for bugs , I got a call from my friend and he told about the multiple open redirection issues he had found in various sub-domains of google , more than 30 domains were affected, i got excited to hear that but as google…

Web Development

4 min read

Exploitation of Google Open redirects using BeEF[Browser exploitation framework]
Exploitation of Google Open redirects using BeEF[Browser exploitation framework]
Web Development

4 min read

Sahil Tikoo

Sahil Tikoo

146 Followers

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech