<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Bug Bounty Tips on Medium]]></title>
        <description><![CDATA[Latest stories tagged with Bug Bounty Tips on Medium]]></description>
        <link>https://medium.com/tag/bug-bounty-tips/latest?source=rss------bug_bounty_tips-5</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Bug Bounty Tips on Medium</title>
            <link>https://medium.com/tag/bug-bounty-tips/latest?source=rss------bug_bounty_tips-5</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Wed, 06 May 2026 15:33:30 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/tag/bug-bounty-tips" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[How Secure Password Hashing Can Take Down Your Server]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://infosecwriteups.com/how-secure-password-hashing-can-take-down-your-server-78a51535a6b0?source=rss------bug_bounty_tips-5"><img src="https://cdn-images-1.medium.com/max/1774/1*ls7bAPw0ycTXGhNxlxfZvA.png" width="1774"></a></p><p class="medium-feed-snippet">Your login endpoint might be the most expensive API you run, and you probably don&#x2019;t treat it that way.</p><p class="medium-feed-link"><a href="https://infosecwriteups.com/how-secure-password-hashing-can-take-down-your-server-78a51535a6b0?source=rss------bug_bounty_tips-5">Continue reading on InfoSec Write-ups »</a></p></div>]]></description>
            <link>https://infosecwriteups.com/how-secure-password-hashing-can-take-down-your-server-78a51535a6b0?source=rss------bug_bounty_tips-5</link>
            <guid isPermaLink="false">https://medium.com/p/78a51535a6b0</guid>
            <category><![CDATA[web-development]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[byte&borrow]]></dc:creator>
            <pubDate>Tue, 05 May 2026 19:15:54 GMT</pubDate>
            <atom:updated>2026-05-05T19:15:54.441Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Unauthenticated Access to AWS via Cognito Identity Pool ID]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://saurabh-jain.medium.com/unauthenticated-access-to-aws-via-cognito-identity-pool-credentials-dc7fd5e01ec7?source=rss------bug_bounty_tips-5"><img src="https://cdn-images-1.medium.com/max/1072/1*OqaoatIVKME7GHoLVCC6dw.png" width="1072"></a></p><p class="medium-feed-snippet">Exploiting temporary credentials giving access to AWS</p><p class="medium-feed-link"><a href="https://saurabh-jain.medium.com/unauthenticated-access-to-aws-via-cognito-identity-pool-credentials-dc7fd5e01ec7?source=rss------bug_bounty_tips-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://saurabh-jain.medium.com/unauthenticated-access-to-aws-via-cognito-identity-pool-credentials-dc7fd5e01ec7?source=rss------bug_bounty_tips-5</link>
            <guid isPermaLink="false">https://medium.com/p/dc7fd5e01ec7</guid>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[aws]]></category>
            <dc:creator><![CDATA[Saurabh Jain]]></dc:creator>
            <pubDate>Tue, 05 May 2026 09:17:36 GMT</pubDate>
            <atom:updated>2026-05-05T13:36:45.945Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Bug Hunter Notebook (CHAPTER — 1)]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://spidergk.medium.com/bug-hunter-notebook-chapter-1-3fef97bc9367?source=rss------bug_bounty_tips-5"><img src="https://cdn-images-1.medium.com/max/1536/1*_Wf7ukFCEXNe0t7G1mJSHg.png" width="1536"></a></p><p class="medium-feed-snippet">The complete Field Guide &#x2014; 2025 | 2026 Edition</p><p class="medium-feed-link"><a href="https://spidergk.medium.com/bug-hunter-notebook-chapter-1-3fef97bc9367?source=rss------bug_bounty_tips-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://spidergk.medium.com/bug-hunter-notebook-chapter-1-3fef97bc9367?source=rss------bug_bounty_tips-5</link>
            <guid isPermaLink="false">https://medium.com/p/3fef97bc9367</guid>
            <category><![CDATA[black-box-testing]]></category>
            <category><![CDATA[offsec]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <dc:creator><![CDATA[Gourav(spidergk)]]></dc:creator>
            <pubDate>Mon, 04 May 2026 18:26:59 GMT</pubDate>
            <atom:updated>2026-05-04T18:26:59.083Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[The Ghost Email: How Weak Validation Broke Authentication]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://scriptjacker.medium.com/the-ghost-email-how-weak-validation-broke-authentication-b45774caae70?source=rss------bug_bounty_tips-5"><img src="https://cdn-images-1.medium.com/max/1312/1*Lb4nJbGV-Cv3FdwrJN9gCw.jpeg" width="1312"></a></p><p class="medium-feed-snippet">Hey Hackers, I am Parth Narula. A penetration tester, bug hunter, red teamer and overall a security researcher. I live for those moments&#x2026;</p><p class="medium-feed-link"><a href="https://scriptjacker.medium.com/the-ghost-email-how-weak-validation-broke-authentication-b45774caae70?source=rss------bug_bounty_tips-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://scriptjacker.medium.com/the-ghost-email-how-weak-validation-broke-authentication-b45774caae70?source=rss------bug_bounty_tips-5</link>
            <guid isPermaLink="false">https://medium.com/p/b45774caae70</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <dc:creator><![CDATA[Parth Narula]]></dc:creator>
            <pubDate>Mon, 04 May 2026 17:42:05 GMT</pubDate>
            <atom:updated>2026-05-04T17:42:05.099Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[CPDoS via Content Negotiation Mechanism]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@bbcodejump/cpdos-via-content-negotiation-mechanism-4fdb438ad7d0?source=rss------bug_bounty_tips-5"><img src="https://cdn-images-1.medium.com/max/1536/1*injY3TXN2xYagXhVOyRksg.png" width="1536"></a></p><p class="medium-feed-snippet">Exploring how response format switching leads to CPDoS</p><p class="medium-feed-link"><a href="https://medium.com/@bbcodejump/cpdos-via-content-negotiation-mechanism-4fdb438ad7d0?source=rss------bug_bounty_tips-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@bbcodejump/cpdos-via-content-negotiation-mechanism-4fdb438ad7d0?source=rss------bug_bounty_tips-5</link>
            <guid isPermaLink="false">https://medium.com/p/4fdb438ad7d0</guid>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[web-cache-poisoning]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <dc:creator><![CDATA[c0dejump]]></dc:creator>
            <pubDate>Mon, 04 May 2026 07:35:39 GMT</pubDate>
            <atom:updated>2026-05-04T09:02:01.081Z</atom:updated>
            <cc:license>http://creativecommons.org/publicdomain/zero/1.0/</cc:license>
        </item>
        <item>
            <title><![CDATA[Chaining Logic Flaws: From KYC Bypass to Authenticated Time-Based SQLi and Mass IDOR]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@xelcezeri/chaining-logic-flaws-from-kyc-bypass-to-authenticated-time-based-sqli-and-mass-idor-0425f362dad5?source=rss------bug_bounty_tips-5"><img src="https://cdn-images-1.medium.com/max/887/1*KasAQhh6vEclehnhMQ1EMg.png" width="887"></a></p><p class="medium-feed-snippet">1. Entry Point: Phone Verification (KYC) Bypass</p><p class="medium-feed-link"><a href="https://medium.com/@xelcezeri/chaining-logic-flaws-from-kyc-bypass-to-authenticated-time-based-sqli-and-mass-idor-0425f362dad5?source=rss------bug_bounty_tips-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@xelcezeri/chaining-logic-flaws-from-kyc-bypass-to-authenticated-time-based-sqli-and-mass-idor-0425f362dad5?source=rss------bug_bounty_tips-5</link>
            <guid isPermaLink="false">https://medium.com/p/0425f362dad5</guid>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <dc:creator><![CDATA[elcezeri]]></dc:creator>
            <pubDate>Sun, 03 May 2026 16:47:45 GMT</pubDate>
            <atom:updated>2026-05-03T16:47:45.062Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[How I Broke a Travel Giant’s “Non-Refundable” Policy for a $12,000 Bounty]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@21bec131/how-i-broke-a-travel-giants-non-refundable-policy-for-a-12-000-bounty-04148200279a?source=rss------bug_bounty_tips-5"><img src="https://cdn-images-1.medium.com/max/2600/0*gTu3hvKmTp_hUS3s" width="5076"></a></p><p class="medium-feed-snippet">If you&#x2019;ve ever booked a &#x201C;non-refundable&#x201D; hotel room, you know that feeling of dread when your plans change. You&#x2019;re locked in. The money is&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@21bec131/how-i-broke-a-travel-giants-non-refundable-policy-for-a-12-000-bounty-04148200279a?source=rss------bug_bounty_tips-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@21bec131/how-i-broke-a-travel-giants-non-refundable-policy-for-a-12-000-bounty-04148200279a?source=rss------bug_bounty_tips-5</link>
            <guid isPermaLink="false">https://medium.com/p/04148200279a</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <dc:creator><![CDATA[Tanvi Chauhan]]></dc:creator>
            <pubDate>Sun, 03 May 2026 16:41:01 GMT</pubDate>
            <atom:updated>2026-05-03T16:41:01.428Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Parameter Index Manipulation Leading to Unauthorized Field Injection]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@0xoroot/parameter-index-manipulation-leading-to-unauthorized-field-injection-7e830ecfad05?source=rss------bug_bounty_tips-5"><img src="https://cdn-images-1.medium.com/max/600/1*ZZL9dSFuw9q46HRGKXZq5A.png" width="600"></a></p><p class="medium-feed-snippet">Introduction</p><p class="medium-feed-link"><a href="https://medium.com/@0xoroot/parameter-index-manipulation-leading-to-unauthorized-field-injection-7e830ecfad05?source=rss------bug_bounty_tips-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@0xoroot/parameter-index-manipulation-leading-to-unauthorized-field-injection-7e830ecfad05?source=rss------bug_bounty_tips-5</link>
            <guid isPermaLink="false">https://medium.com/p/7e830ecfad05</guid>
            <category><![CDATA[hackerone]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <dc:creator><![CDATA[0xoroot]]></dc:creator>
            <pubDate>Sun, 03 May 2026 11:01:27 GMT</pubDate>
            <atom:updated>2026-05-03T11:01:27.993Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[The Ghost in the Machine: A Bug Bounty Short Story]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://abdelaalx2000.medium.com/the-ghost-in-the-machine-a-bug-bounty-short-story-58f2367705a6?source=rss------bug_bounty_tips-5"><img src="https://cdn-images-1.medium.com/max/600/1*l_ckJDKxINgQDHVvv-OEhQ.png" width="600"></a></p><p class="medium-feed-snippet">It was 2:00 AM, and my terminal was a blur of scrolling green text. I was deep into a private bug bounty program for a massive corporate&#x2026;</p><p class="medium-feed-link"><a href="https://abdelaalx2000.medium.com/the-ghost-in-the-machine-a-bug-bounty-short-story-58f2367705a6?source=rss------bug_bounty_tips-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://abdelaalx2000.medium.com/the-ghost-in-the-machine-a-bug-bounty-short-story-58f2367705a6?source=rss------bug_bounty_tips-5</link>
            <guid isPermaLink="false">https://medium.com/p/58f2367705a6</guid>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[recon]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <dc:creator><![CDATA[Mohamed Adel]]></dc:creator>
            <pubDate>Sun, 03 May 2026 09:14:45 GMT</pubDate>
            <atom:updated>2026-05-03T09:14:45.338Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Proving Grounds |Pelican | OSCP Preparation]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@SilentExploit/proving-grounds-pelican-oscp-preparation-37e94deee7dc?source=rss------bug_bounty_tips-5"><img src="https://cdn-images-1.medium.com/max/901/1*u8FDBbYpf34pWWRacTbShA.png" width="901"></a></p><p class="medium-feed-snippet">As part of my OSCP preparation series; I will be covering walk throughs for all the boxes on the TJ null list. Today we are looking at&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@SilentExploit/proving-grounds-pelican-oscp-preparation-37e94deee7dc?source=rss------bug_bounty_tips-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@SilentExploit/proving-grounds-pelican-oscp-preparation-37e94deee7dc?source=rss------bug_bounty_tips-5</link>
            <guid isPermaLink="false">https://medium.com/p/37e94deee7dc</guid>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[tech]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[technology]]></category>
            <dc:creator><![CDATA[SilentExploit]]></dc:creator>
            <pubDate>Sat, 02 May 2026 18:54:51 GMT</pubDate>
            <atom:updated>2026-05-02T18:54:51.807Z</atom:updated>
        </item>
    </channel>
</rss>