<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>BugBounties on </title>
    <link>https://n9o.xyz/bugbounty/</link>
    <description>Recent content in BugBounties on </description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 Vaishnav Baraskar</copyright>
    <lastBuildDate>Sat, 14 Sep 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://n9o.xyz/bugbounty/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>The Phantom Subdomain: How I Found Slack’s Forgotten Backdoor</title>
      <link>https://n9o.xyz/bugbounty/slack/</link>
      <pubDate>Sat, 14 Sep 2024 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/slack/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;Prologue — The Digital Graveyard 
    &lt;div id=&#34;prologue--the-digital-graveyard&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;
    
    &lt;span
        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 ltr:-left-6 rtl:-right-6 not-prose group-hover:opacity-100&#34;&gt;
        &lt;a class=&#34;group-hover:text-primary-300 dark:group-hover:text-neutral-700 !no-underline&#34; href=&#34;#prologue--the-digital-graveyard&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;
    &lt;/span&gt;        
    
&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Midnight. The glow of my monitor painted the walls a faint blue as I scrolled through Slack’s sprawling domain records.&lt;/strong&gt;&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/slack/feature.png" />
    </item>
    
    <item>
      <title>3 AM &amp; Phantom Requests: My Blind SSRF Journey Through Shopify&#39;s PDF Underworld</title>
      <link>https://n9o.xyz/bugbounty/shopify/</link>
      <pubDate>Thu, 23 May 2024 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/shopify/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;Prologue — The Accidental Discovery 
    &lt;div id=&#34;prologue--the-accidental-discovery&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;
    
    &lt;span
        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 ltr:-left-6 rtl:-right-6 not-prose group-hover:opacity-100&#34;&gt;
        &lt;a class=&#34;group-hover:text-primary-300 dark:group-hover:text-neutral-700 !no-underline&#34; href=&#34;#prologue--the-accidental-discovery&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;
    &lt;/span&gt;        
    
&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;2:03 AM — My third espresso was long cold. The glow of the Shopify admin panel lit up my desk like a scene out of a low-budget cyber thriller.&lt;/strong&gt;&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/shopify/feature.jpg" />
    </item>
    
    <item>
      <title>Coffee, Curiosity &amp; an API – JWT &#39;alg:none&#39; Exploit in HealthTrack</title>
      <link>https://n9o.xyz/bugbounty/healthtrack/</link>
      <pubDate>Mon, 19 Feb 2024 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/healthtrack/</guid>
      <description>&lt;h1 class=&#34;relative group&#34;&gt;&lt;strong&gt;Prologue: Coffee, Curiosity &amp;amp; an API&lt;/strong&gt; 
    &lt;div id=&#34;prologue-coffee-curiosity--an-api&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;
    
    &lt;span
        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 ltr:-left-6 rtl:-right-6 not-prose group-hover:opacity-100&#34;&gt;
        &lt;a class=&#34;group-hover:text-primary-300 dark:group-hover:text-neutral-700 !no-underline&#34; href=&#34;#prologue-coffee-curiosity--an-api&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;
    &lt;/span&gt;        
    
&lt;/h1&gt;
&lt;p&gt;It was one of those quiet February evenings. No caffeine left in the mug, but my curiosity was wide awake. The glow from the screen illuminated my desk, casting a soft digital haze. I was drifting through recon mode—scrolling API docs, poking endpoints, intercepting calls like I was casually flipping through a dusty book in a forgotten archive.&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/healthtrack/feature.jpg" />
    </item>
    
    <item>
      <title>LocalNews and the Whispering Header - SQLi in a Forgotten Log</title>
      <link>https://n9o.xyz/bugbounty/localnews/</link>
      <pubDate>Sat, 17 Feb 2024 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/localnews/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;Prologue — When Headers Speak 
    &lt;div id=&#34;prologue--when-headers-speak&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;
    
    &lt;span
        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 ltr:-left-6 rtl:-right-6 not-prose group-hover:opacity-100&#34;&gt;
        &lt;a class=&#34;group-hover:text-primary-300 dark:group-hover:text-neutral-700 !no-underline&#34; href=&#34;#prologue--when-headers-speak&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;
    &lt;/span&gt;        
    
&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;10:47 PM — Rain tapped against the window while Burp Suite ran idle.&lt;/strong&gt; I was deep into recon on a small CMS platform called &lt;em&gt;LocalNews&lt;/em&gt;. The payout was modest, the target obscure—but that’s the beauty of it. Quiet places often hide loud bugs.&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/localnews/feature.jpg" />
    </item>
    
    <item>
      <title>The Anatomy of a Clickjacking Vulnerability: A Trello Deep Dive</title>
      <link>https://n9o.xyz/bugbounty/trello/</link>
      <pubDate>Wed, 15 Nov 2023 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/trello/</guid>
      <description>An exploration of a clickjacking vulnerability found in Trello&amp;rsquo;s public boards, examining the technical details, potential impacts, and broader security lessons about proper header configurations.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/trello/feature.jpeg" />
    </item>
    
    <item>
      <title>TaskMaster – How an Avatar Became a Cookie Monster</title>
      <link>https://n9o.xyz/bugbounty/taskmaster/</link>
      <pubDate>Thu, 05 Oct 2023 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/taskmaster/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;Prologue — Of Avatars and Curiosity 
    &lt;div id=&#34;prologue--of-avatars-and-curiosity&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;
    
    &lt;span
        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 ltr:-left-6 rtl:-right-6 not-prose group-hover:opacity-100&#34;&gt;
        &lt;a class=&#34;group-hover:text-primary-300 dark:group-hover:text-neutral-700 !no-underline&#34; href=&#34;#prologue--of-avatars-and-curiosity&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;
    &lt;/span&gt;        
    
&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;It started with a profile page.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Late one night in October, I was sipping on reheated coffee and casually poking around the &amp;ldquo;TaskMaster&amp;rdquo; app — a tidy little task management platform listed on YesWeHack. On the surface, it was clean, minimal, maybe even a bit charming.&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/taskmaster/feature.jpeg" />
    </item>
    
    <item>
      <title>Silent Payloads: DOM-Based XSS in PayPal’s Checkout</title>
      <link>https://n9o.xyz/bugbounty/paypal/</link>
      <pubDate>Mon, 24 Jul 2023 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/paypal/</guid>
      <description>&lt;h1 class=&#34;relative group&#34;&gt;Silent Payloads: DOM-Based XSS in PayPal’s Checkout 
    &lt;div id=&#34;silent-payloads-dom-based-xss-in-paypals-checkout&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;
    
    &lt;span
        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 ltr:-left-6 rtl:-right-6 not-prose group-hover:opacity-100&#34;&gt;
        &lt;a class=&#34;group-hover:text-primary-300 dark:group-hover:text-neutral-700 !no-underline&#34; href=&#34;#silent-payloads-dom-based-xss-in-paypals-checkout&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;
    &lt;/span&gt;        
    
&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;How a routine evening review of &lt;code&gt;postMessage&lt;/code&gt; logic in third-party iframes spiraled into a silent, weaponizable DOM XSS — tucked neatly within a trusted payment flow.&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/paypal/feature.jpg" />
    </item>
    
    <item>
      <title>12:57 AM and a Concurrency Fault: How I Exploited Uber’s Coupon Redemption Logic</title>
      <link>https://n9o.xyz/bugbounty/uber/</link>
      <pubDate>Tue, 13 Jun 2023 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/uber/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;&lt;strong&gt;Prologue: 12:57 AM&lt;/strong&gt; 
    &lt;div id=&#34;prologue-1257-am&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;
    
    &lt;span
        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 ltr:-left-6 rtl:-right-6 not-prose group-hover:opacity-100&#34;&gt;
        &lt;a class=&#34;group-hover:text-primary-300 dark:group-hover:text-neutral-700 !no-underline&#34; href=&#34;#prologue-1257-am&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;
    &lt;/span&gt;        
    
&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;The apartment was quiet. I was not hunting vulnerabilities or replaying traffic with aggressive fuzzing. It was more observational – that rare and quiet mindset that often reveals misbehavior where others only see clean execution.&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/uber/feature.png" />
    </item>
    
    <item>
      <title>Broken Authentication: Uncovering Twitter&#39;s OAuth Vulnerability</title>
      <link>https://n9o.xyz/bugbounty/twitter/</link>
      <pubDate>Fri, 07 Apr 2023 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/twitter/</guid>
      <description>A technical deep dive into an authentication vulnerability in Twitter&amp;rsquo;s legacy API that allowed bypassing signature validation, exposing user data through inconsistent OAuth enforcement.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/twitter/feature.png" />
    </item>
    
    <item>
      <title>&#34;PetCare&#34; – CSRF in the Admin Panel: When One Click Made You an Admin</title>
      <link>https://n9o.xyz/bugbounty/petcare/</link>
      <pubDate>Wed, 15 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/petcare/</guid>
      <description>A simple POST request without CSRF protection allowed me to trick a PetCare admin into granting me admin privileges. This writeup dives into the exploitation steps, mental process, root cause, and patching of a high-risk vulnerability in their internal panel.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/petcare/feature.png" />
    </item>
    
    <item>
      <title>Curiosity &amp; file_id=187: My First Bug Bounty Journey with FileSharePro</title>
      <link>https://n9o.xyz/bugbounty/filesharepro/</link>
      <pubDate>Thu, 09 Feb 2023 00:00:00 +0000</pubDate>
      
      <guid>https://n9o.xyz/bugbounty/filesharepro/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;Prologue — A New Hunter’s First Spark 
    &lt;div id=&#34;prologue--a-new-hunters-first-spark&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;
    
    &lt;span
        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 ltr:-left-6 rtl:-right-6 not-prose group-hover:opacity-100&#34;&gt;
        &lt;a class=&#34;group-hover:text-primary-300 dark:group-hover:text-neutral-700 !no-underline&#34; href=&#34;#prologue--a-new-hunters-first-spark&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;
    &lt;/span&gt;        
    
&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;They always say your first bounty feels different.&lt;/strong&gt;&lt;br&gt;
For me, it started with a file URL. Not a secret admin panel or a vulnerable upload endpoint. Just a link:&lt;br&gt;
&lt;code&gt;https://filesharepro.com/download?file_id=123&lt;/code&gt;&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://n9o.xyz/bugbounty/filesharepro/feature.gif" />
    </item>
    
  </channel>
</rss>
