Open in app

Sign In

Write

Sign In

Mostafa
Mostafa

59 Followers

Home

About

Apr 20

Insecure Docker Registry API Leads To Pull All Private Docker Images

Hello Guys, I Would Like To Share This Report Has been reported To Public Program in bugcrowd Summary What is Docker? Docker is a very popular platform used by developers to eliminate “works on my machine” problems when collaborating on code with co-workers. Enterprises use Docker to build agile software delivery pipelines to ship new features faster, more securely and with confidence for apps. What are Docker Images…

Bug Bounty

3 min read

Insecure Docker Registry API Leads To Pull All Private Docker Images
Insecure Docker Registry API Leads To Pull All Private Docker Images
Bug Bounty

3 min read


Aug 27, 2021

S3 Bucket Misconfiguration Lead To Access Sensitive Files

Hello Guys, I Would Like To Share This Report Has been reported To Private Program In Hackerone Summary I have discovered S3 bucket and tested it via the AWS command-line tool in Linux. It looks like permissions are not well configured and allow Access raw Files First You Need To…

Bug Bounty

2 min read

S3 Bucket Misconfiguration Lead To Access Sensitive Files
S3 Bucket Misconfiguration Lead To Access Sensitive Files
Bug Bounty

2 min read


Feb 28, 2021

Path Traversal Via Misconfiguration Ngnix

This Write-up Very useful for Bug Hunters and System Admins and Web Developers Summary if you are using ngnix as web server in production or staging you may be configure the alias directives in the wrong way and that’s lead To Path Traversal Attack which mean The Attacker Cloud Be…

Bug Hunting

1 min read

Path Traversal Via Misconfiguration Ngnix
Path Traversal Via Misconfiguration Ngnix
Bug Hunting

1 min read


Feb 6, 2021

Bypass Rate Limit Based on source Ip

Rate Limit definition In computer networks, rate limiting is used to control the rate of requests sent or received by a network interface controller. It can be used to prevent DoS attacks and limit web scraping some packages you can use to prevent Rate Limit Attacks these packages prevent based…

Bug Bounty

2 min read

Bypass Rate Limit Based on source Ip
Bypass Rate Limit Based on source Ip
Bug Bounty

2 min read


Nov 21, 2020

2 Reflected XSS In Razer

First Of All thanks for reading my first write up in medium My Name Is Mostafa I Am Working As information Security Engineer And My Part Time Doing Some Bug Hunting I Found 2 Vulnerabilities In The Different Subdomains in Razer The First One is reflected XSS in (http://drivers.razersupport.com) When I Searching To XSS Looked To Refelected Params I Found CSRF Token…

Razer

2 min read

2 Reflected XSS In Razer
2 Reflected XSS In Razer
Razer

2 min read

Mostafa

Mostafa

59 Followers

Information Security Engineer And Bug Hunter

Following
  • S12 - H4CK

    S12 - H4CK

  • Karol Mazurek

    Karol Mazurek

  • Netflix Technology Blog

    Netflix Technology Blog

  • Immunefi

    Immunefi

  • Aayush Vishnoi

    Aayush Vishnoi

See all (30)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams