<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Bug Bounty Writeup on Medium]]></title>
        <description><![CDATA[Latest stories tagged with Bug Bounty Writeup on Medium]]></description>
        <link>https://medium.com/tag/bug-bounty-writeup/latest?source=rss------bug_bounty_writeup-5</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Bug Bounty Writeup on Medium</title>
            <link>https://medium.com/tag/bug-bounty-writeup/latest?source=rss------bug_bounty_writeup-5</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Wed, 06 May 2026 15:34:00 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/tag/bug-bounty-writeup" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[The “Infinite Discount” Glitch: How I Used a Race Condition to Buy a MacBook for -$300]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@21bec131/the-infinite-discount-glitch-how-i-used-a-race-condition-to-buy-a-macbook-for-300-4257a28e1946?source=rss------bug_bounty_writeup-5"><img src="https://cdn-images-1.medium.com/max/2600/0*ACWe3zfH1s6FaDGR" width="6000"></a></p><p class="medium-feed-snippet">This is the story of how a &#x201C;boring&#x201D; e-commerce site turned into a playground for a Race Condition vulnerability. If you think hacking is&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@21bec131/the-infinite-discount-glitch-how-i-used-a-race-condition-to-buy-a-macbook-for-300-4257a28e1946?source=rss------bug_bounty_writeup-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@21bec131/the-infinite-discount-glitch-how-i-used-a-race-condition-to-buy-a-macbook-for-300-4257a28e1946?source=rss------bug_bounty_writeup-5</link>
            <guid isPermaLink="false">https://medium.com/p/4257a28e1946</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Tanvi Chauhan]]></dc:creator>
            <pubDate>Tue, 05 May 2026 16:21:01 GMT</pubDate>
            <atom:updated>2026-05-05T16:21:01.827Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Unauthorized Workspace Deletion via Broken Access Control]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@sagar_kirola-G35638/unauthorized-workspace-deletion-via-broken-access-control-e7fbd4234581?source=rss------bug_bounty_writeup-5"><img src="https://cdn-images-1.medium.com/max/600/1*ep5GpHIlRA5WHMa7UkksIA.jpeg" width="600"></a></p><p class="medium-feed-snippet">Hello hunters, hope you all are crushing bugs &#x1F44B;</p><p class="medium-feed-link"><a href="https://medium.com/@sagar_kirola-G35638/unauthorized-workspace-deletion-via-broken-access-control-e7fbd4234581?source=rss------bug_bounty_writeup-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@sagar_kirola-G35638/unauthorized-workspace-deletion-via-broken-access-control-e7fbd4234581?source=rss------bug_bounty_writeup-5</link>
            <guid isPermaLink="false">https://medium.com/p/e7fbd4234581</guid>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[news]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Sagar Kirola]]></dc:creator>
            <pubDate>Tue, 05 May 2026 14:54:31 GMT</pubDate>
            <atom:updated>2026-05-05T14:54:31.800Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[HackTheBox — TwoMillion: A Lesson in API Abuse and Privilege Escalation]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@shxdowz/hackthebox-twomillion-a-lesson-in-api-abuse-and-privilege-escalation-0c66bd704070?source=rss------bug_bounty_writeup-5"><img src="https://cdn-images-1.medium.com/max/1800/1*ElrnaSYyNTbIIrm0HPK-Tw.png" width="1800"></a></p><p class="medium-feed-snippet">Difficulty: Easy | OS: Linux | Tags: API, Command Injection, CVE-2023&#x2013;0386, OverlayFS</p><p class="medium-feed-link"><a href="https://medium.com/@shxdowz/hackthebox-twomillion-a-lesson-in-api-abuse-and-privilege-escalation-0c66bd704070?source=rss------bug_bounty_writeup-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@shxdowz/hackthebox-twomillion-a-lesson-in-api-abuse-and-privilege-escalation-0c66bd704070?source=rss------bug_bounty_writeup-5</link>
            <guid isPermaLink="false">https://medium.com/p/0c66bd704070</guid>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[ctf]]></category>
            <category><![CDATA[hackthebox-walkthrough]]></category>
            <category><![CDATA[hackthebox]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <dc:creator><![CDATA[Shxdowz]]></dc:creator>
            <pubDate>Tue, 05 May 2026 05:51:37 GMT</pubDate>
            <atom:updated>2026-05-05T05:51:37.609Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[From Directory Brute-Forcing to Real-Time GPS Tracking: Exploiting S3 Bucket Misconfigurations]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@21bec131/from-directory-brute-forcing-to-real-time-gps-tracking-exploiting-s3-bucket-misconfigurations-f03b088a0a3d?source=rss------bug_bounty_writeup-5"><img src="https://cdn-images-1.medium.com/max/2600/0*FP5kl67YLEuP836F" width="4460"></a></p><p class="medium-feed-snippet">This isn&#x2019;t just a story about a bug; it&#x2019;s a story about the &#x201C;Subdomain Graveyard&#x201D; that dusty, forgotten corner of the internet where&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@21bec131/from-directory-brute-forcing-to-real-time-gps-tracking-exploiting-s3-bucket-misconfigurations-f03b088a0a3d?source=rss------bug_bounty_writeup-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@21bec131/from-directory-brute-forcing-to-real-time-gps-tracking-exploiting-s3-bucket-misconfigurations-f03b088a0a3d?source=rss------bug_bounty_writeup-5</link>
            <guid isPermaLink="false">https://medium.com/p/f03b088a0a3d</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Tanvi Chauhan]]></dc:creator>
            <pubDate>Mon, 04 May 2026 19:15:10 GMT</pubDate>
            <atom:updated>2026-05-04T19:15:10.935Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[The Ghost Email: How Weak Validation Broke Authentication]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://scriptjacker.medium.com/the-ghost-email-how-weak-validation-broke-authentication-b45774caae70?source=rss------bug_bounty_writeup-5"><img src="https://cdn-images-1.medium.com/max/1312/1*Lb4nJbGV-Cv3FdwrJN9gCw.jpeg" width="1312"></a></p><p class="medium-feed-snippet">Hey Hackers, I am Parth Narula. A penetration tester, bug hunter, red teamer and overall a security researcher. I live for those moments&#x2026;</p><p class="medium-feed-link"><a href="https://scriptjacker.medium.com/the-ghost-email-how-weak-validation-broke-authentication-b45774caae70?source=rss------bug_bounty_writeup-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://scriptjacker.medium.com/the-ghost-email-how-weak-validation-broke-authentication-b45774caae70?source=rss------bug_bounty_writeup-5</link>
            <guid isPermaLink="false">https://medium.com/p/b45774caae70</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <dc:creator><![CDATA[Parth Narula]]></dc:creator>
            <pubDate>Mon, 04 May 2026 17:42:05 GMT</pubDate>
            <atom:updated>2026-05-04T17:42:05.099Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Chaining Logic Flaws: From KYC Bypass to Authenticated Time-Based SQLi and Mass IDOR]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@xelcezeri/chaining-logic-flaws-from-kyc-bypass-to-authenticated-time-based-sqli-and-mass-idor-0425f362dad5?source=rss------bug_bounty_writeup-5"><img src="https://cdn-images-1.medium.com/max/887/1*KasAQhh6vEclehnhMQ1EMg.png" width="887"></a></p><p class="medium-feed-snippet">1. Entry Point: Phone Verification (KYC) Bypass</p><p class="medium-feed-link"><a href="https://medium.com/@xelcezeri/chaining-logic-flaws-from-kyc-bypass-to-authenticated-time-based-sqli-and-mass-idor-0425f362dad5?source=rss------bug_bounty_writeup-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@xelcezeri/chaining-logic-flaws-from-kyc-bypass-to-authenticated-time-based-sqli-and-mass-idor-0425f362dad5?source=rss------bug_bounty_writeup-5</link>
            <guid isPermaLink="false">https://medium.com/p/0425f362dad5</guid>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <dc:creator><![CDATA[elcezeri]]></dc:creator>
            <pubDate>Sun, 03 May 2026 16:47:45 GMT</pubDate>
            <atom:updated>2026-05-03T16:47:45.062Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Real Estate CRM Pentest: Broken Auth + IDOR + Stored XSS — Full Attack Chain]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://alisalive.medium.com/real-estate-crm-pentest-broken-auth-idor-stored-xss-full-attack-chain-5ef610a57e49?source=rss------bug_bounty_writeup-5"><img src="https://cdn-images-1.medium.com/max/1360/1*Ct137lH-WjrD2zm2zQq0dw.png" width="1360"></a></p><p class="medium-feed-snippet">Author: Shikhali Jamalzade (@alisalive)
Type: Authorized Black Box Penetration Test
Target: Anonymized &#x2014; Real Estate CRM Web Application&#x2026;</p><p class="medium-feed-link"><a href="https://alisalive.medium.com/real-estate-crm-pentest-broken-auth-idor-stored-xss-full-attack-chain-5ef610a57e49?source=rss------bug_bounty_writeup-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://alisalive.medium.com/real-estate-crm-pentest-broken-auth-idor-stored-xss-full-attack-chain-5ef610a57e49?source=rss------bug_bounty_writeup-5</link>
            <guid isPermaLink="false">https://medium.com/p/5ef610a57e49</guid>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[web-penetration-testing]]></category>
            <dc:creator><![CDATA[Shikhali Jamalzade]]></dc:creator>
            <pubDate>Sun, 03 May 2026 16:31:12 GMT</pubDate>
            <atom:updated>2026-05-05T10:09:21.371Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Parameter Index Manipulation Leading to Unauthorized Field Injection]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@0xoroot/parameter-index-manipulation-leading-to-unauthorized-field-injection-7e830ecfad05?source=rss------bug_bounty_writeup-5"><img src="https://cdn-images-1.medium.com/max/600/1*ZZL9dSFuw9q46HRGKXZq5A.png" width="600"></a></p><p class="medium-feed-snippet">Introduction</p><p class="medium-feed-link"><a href="https://medium.com/@0xoroot/parameter-index-manipulation-leading-to-unauthorized-field-injection-7e830ecfad05?source=rss------bug_bounty_writeup-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@0xoroot/parameter-index-manipulation-leading-to-unauthorized-field-injection-7e830ecfad05?source=rss------bug_bounty_writeup-5</link>
            <guid isPermaLink="false">https://medium.com/p/7e830ecfad05</guid>
            <category><![CDATA[hackerone]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <dc:creator><![CDATA[0xoroot]]></dc:creator>
            <pubDate>Sun, 03 May 2026 11:01:27 GMT</pubDate>
            <atom:updated>2026-05-03T11:01:27.993Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[The Ghost in the Machine: A Bug Bounty Short Story]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://abdelaalx2000.medium.com/the-ghost-in-the-machine-a-bug-bounty-short-story-58f2367705a6?source=rss------bug_bounty_writeup-5"><img src="https://cdn-images-1.medium.com/max/600/1*l_ckJDKxINgQDHVvv-OEhQ.png" width="600"></a></p><p class="medium-feed-snippet">It was 2:00 AM, and my terminal was a blur of scrolling green text. I was deep into a private bug bounty program for a massive corporate&#x2026;</p><p class="medium-feed-link"><a href="https://abdelaalx2000.medium.com/the-ghost-in-the-machine-a-bug-bounty-short-story-58f2367705a6?source=rss------bug_bounty_writeup-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://abdelaalx2000.medium.com/the-ghost-in-the-machine-a-bug-bounty-short-story-58f2367705a6?source=rss------bug_bounty_writeup-5</link>
            <guid isPermaLink="false">https://medium.com/p/58f2367705a6</guid>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[recon]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <dc:creator><![CDATA[Mohamed Adel]]></dc:creator>
            <pubDate>Sun, 03 May 2026 09:14:45 GMT</pubDate>
            <atom:updated>2026-05-03T09:14:45.338Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Find SQL injection with burp Suite scanner]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://awais0x1.medium.com/discovering-an-sql-injection-with-burps-scanner-41c6c5910d84?source=rss------bug_bounty_writeup-5"><img src="https://cdn-images-1.medium.com/max/1107/1*iz-oYwq_4dqGLP21tCEJwA.png" width="1107"></a></p><p class="medium-feed-snippet">During a testing, we came across this situation:</p><p class="medium-feed-link"><a href="https://awais0x1.medium.com/discovering-an-sql-injection-with-burps-scanner-41c6c5910d84?source=rss------bug_bounty_writeup-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://awais0x1.medium.com/discovering-an-sql-injection-with-burps-scanner-41c6c5910d84?source=rss------bug_bounty_writeup-5</link>
            <guid isPermaLink="false">https://medium.com/p/41c6c5910d84</guid>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[burpsuite]]></category>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[sql-injection]]></category>
            <dc:creator><![CDATA[Awais Nazeer]]></dc:creator>
            <pubDate>Sat, 02 May 2026 18:26:11 GMT</pubDate>
            <atom:updated>2026-05-02T18:31:12.351Z</atom:updated>
        </item>
    </channel>
</rss>