Open in app

Sign In

Write

Sign In

Karan Arora
Karan Arora

374 Followers

Home

About

Published in InfoSec Write-ups

·Pinned

5 Most Effective Ways of Learning in Bug Bounty

Follow these ways and no one can stop you from achieving your dream !! Let’s get straight into it. 1. READ WRITEUPS I can’t stress it enough when I say read writeups, it is the most valuable learning resource because when you read a writeup about a particular vulnerability or something else, you…

Bug Bounty

3 min read

5 Most Effective Ways of Learning in Bug Bounty
5 Most Effective Ways of Learning in Bug Bounty
Bug Bounty

3 min read


Pinned

I Reported 30 Vulnerabilities in 1 Day

Yeah hi, as of now I'm free. So I thought of sharing my experience when I reported 30 bugs to different programs in one day. This writeup is divided into the following sections : Back Story Results Learnings Bug Bounty Platforms: Bugcrowd, Hackerone, Intigriti, Public Responsible Disclosures Back Story : Just so you…

Bug Bounty

3 min read

I Reported 30 Vulnerabilities in 1 Day
I Reported 30 Vulnerabilities in 1 Day
Bug Bounty

3 min read


Dec 11, 2021

Disrupting an Application’s User Registration Process in 10 mins

So as usual this writeup will be divided into three sections Introduction. Vulnerability Description. Steps to reproduce. Introduction What are business logic vulnerabilities? Business logic vulnerabilities are flaws in the design and implementation of an application that allows an attacker to elicit unintended behaviour. This potentially enables attackers to manipulate legitimate…

Bug Bounty

4 min read

Disrupting an Application’s Registration Process in 10 mins
Disrupting an Application’s Registration Process in 10 mins
Bug Bounty

4 min read


Dec 10, 2021

Using Twitter as a Bug Bounty Hunter

Hi guys, I’m back with another quick and useful writeup for you guys. In this i’m going to show you in detail, how to use twitter the right way. And there’s a reason why i’m even specifying it by calling the “right way”. While keeping this writeup to the point…

Bug Bounty

2 min read

Using Twitter as a Bug Bounty Hunter
Using Twitter as a Bug Bounty Hunter
Bug Bounty

2 min read


Jul 8, 2021

Is Bug Bounty Too Saturated in 2021 ?

Read this to get your answer, is it really saturated or not. Hi there, you are here for the answer and i’m going to give you the answer with supporting facts. Let’s get into it ! See in short the answer to this question If bug bounty is saturated in 2021 ? is NO, it’s…

Bug Bounty

3 min read

Is Bug Bounty Too Saturated in 2021 ?
Is Bug Bounty Too Saturated in 2021 ?
Bug Bounty

3 min read


Jun 23, 2021

BUG BOUNTY - HALL OF FAME 2021

Class of the Most Influential Hackers in the Bug Bounty Community Hi hackers, so we all know that we have a great community in which everyone contributes a lot and helps each other. I thought it would be justifying to have a separate Hall of Fame dedicated to the most…

Bug Bounty

5 min read

BUG BOUNTY - HALL OF FAME 2021
BUG BOUNTY - HALL OF FAME 2021
Bug Bounty

5 min read


Jun 16, 2021

Bug Bounty Wordlists

An all in one bug bounty wordlists repository Wordlists are an important part of researching a particular target. Why this repository? Personally, I have used a lot of word lists that are already available on the internet and I have also made some of my personal wordlists. And we all…

Bug Bounty

2 min read

Bug Bounty Wordlists
Bug Bounty Wordlists
Bug Bounty

2 min read


Jun 3, 2021

Bypassing Rate Limit ( using Timestamp )

This write up is divided into the following sections : Introduction Vulnerability description and attack methodology. Steps to reproduce and bypass rate limit. INTRODUCTION What is Rate Limiting ? Rate limiting is a strategy for limiting network traffic. It puts a cap on how often someone can repeat an action within…

Bugbounty

4 min read

Bypassing Rate Limit ( using Timestamp )
Bypassing Rate Limit ( using Timestamp )
Bugbounty

4 min read

Karan Arora

Karan Arora

374 Followers

my twitter looks juicy... @itskaranxa

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech