Gospel
@40sp3l
Offensive Security | Christain | Bug Bounty Hunter | Vulnerability Researcher | 0x19 | Pentester
Me : Uses VPN, Tor, aliases, burner devices Also me : Logs into Gmail to check something.

Why I Started 30-Days Bug Bounty Hunting Challenge Before Going Full-Time. - I hope it helps. medium.com/@40sp3l/why-i-…
Sometimes, the application could leak it in maybe the stylesheet, source code ( but it might hard to find ), i was able to know the version by decompressing a base64 GZIPed-encoded data, which leaked it in the JSON object... if you find one, check for known exploits / CVEs.
How i Can know the version of telerik
Yo fam 👋 Been on a 30-day bug hunt grind, not for bounties, but to learn, build, and sharpen my skills, and level up before going full-time hacking. Once I'm done, I’ll be focusing fully on P1–P2 level vulnerabilities and digging deep for impactful findings...
no one can buy security. You can throw millions at vendors, audits, and certifications, but without the right implementation and discipline, it’s all just for show.
SSRF → Metadata Access → AWS Credentials → S3 Access → Credential Dump → Privilege Escalation → Takeover "It began with a blind SSRF. It ended with full infrastructure compromise." medium.com/@narendarlb123…
One thing this life has taught me is, you can do great things from small place.
Zero-Click Account Takeover : The Power of JavaScript Analysis Credit : Ali Saadi medium.com/@ali_saadi/zer…