Skip to content

Bergee's Stories on Bug Hunting

hacking, cyber security and programming

Menu
  • Blog
  • About Me
  • Resources
  • Side projects
Menu

Why do you need the VPS for bug bounty

2025-11-252025-11-25

When I started doing bug bounty I’ve been using my home computer for all. Recon, host scanning, domain bruteforcing, port scanning, subdomains enumeration, screenshoting websites. All was good until the first problems arise. While scanning, some pages blocked me, this way me or my girlfriend coudn’t use the website. There was also problems with VOD…

Read more

WAF bypass and credential theft with XSS and Google Analytics

2025-10-312025-11-04

Hello In this post, I will tell you how I was able to escalate the bug from HTML injection to stealing credentials via Google Analytics… well, almost 😉 I was testing the website and inserted “><u>aaa</u> into the main search bar without big expectations.  I was really surprised when I saw aaa. Next step was…

Read more

How two dollars and one zip file let me read the server files

2025-09-122025-11-04

Hi there There was an app which allowed me to buy domains and offered different types of hosting. First I was testing the free features of the app and found really cool XSS bug but it is the different story :). Then I decided to invest some money and bought the domain, let’s call it…

Read more

Subdomain takeover – easy $150 for five minutes of work

2025-08-072025-08-07

Hello The title might have been clickbait but it is not. I started from recon and discovered as many subdomains as possible of the target.com company. Then I used dnsx tool to check all  NXDOMAINS which have CNAME records. Among them I found the subdomain pointing to cloudapp.azure.com domain, which looked like this: dev.target.com 600…

Read more

How I hacked XXXX for fun and !profit

2025-02-09

I am a little bit late but Happy New Year 🙂 In the beginning of the year I decided to hack one company, let’s call it XXX as I can’t give the real name. The company is running VDP program and offers only letters of appreciacion. So I wanted to get one. I started my…

Read more

Accessing admin panel with fuzzing, digging and guessing

2024-10-162024-10-16

Hello folks This time I want to tell you the story how I gained access to some admin functionalities  and leaked some sensitive info using FUFF, Burp, my eyes, and brain :). Fuzzing Let’s call the target “redacted.com”. I started fuzzing the target with FUFF and found an /admin endpoint https://redacted.com/app/admin which displayed: “Sorry you’re…

Read more

From AngularJS CSTI to credentials theft

2024-07-032024-07-04

Hello again This time I will tell you about the easy way of credentials theft. I was doing some recon on some sites. I stumbled upon a site with the login form. I checked Wappalyzer and saw the site is using Angular 1.1.3. I immediately put {{7*7}} payload in the login form and pressed the…

Read more

The story of exposed service, SSRF, CSP bypass and credentials stealing via XSS

2024-03-202024-03-22

Hello there Another day, another bug 🙂  I started looking at the portal at redacted.com. The portal was written with PHP so I started fuzzing it a bit with fuff. Due to rate limiting this took some time.  I found the endpoind called /resize. When I entered it I saw just: [img] Must set src-attribute….

Read more

“Hacking” the hotel room TV

2023-09-14

Hello everyone It’s been a while since my last post. Holiday time :). And it will be some hacking experience from that time. I was living in a hotel in sunny Portugal and after a long day of tripping, I decided to watch another episode of the “The Dropout” series. So I connected my Amazon…

Read more

Broken links hijacking and CDN takeover

2023-02-282023-03-01

Hello again This time I want to tell you about the broken links hijacking technique which I decided to give a chance after reading some blog posts about it. The whole process consists of grabbing all the external links from the site and checking if they point to either non-existent (NXDOMAIN) or to some domain…

Read more
  • 1
  • 2
  • Next
  • Why do you need the VPS for bug bounty
  • WAF bypass and credential theft with XSS and Google Analytics
  • How two dollars and one zip file let me read the server files
  • Subdomain takeover – easy $150 for five minutes of work
  • How I hacked XXXX for fun and !profit
  • Accessing admin panel with fuzzing, digging and guessing
  • From AngularJS CSTI to credentials theft
  • The story of exposed service, SSRF, CSP bypass and credentials stealing via XSS
  • “Hacking” the hotel room TV
  • Broken links hijacking and CDN takeover
  • How I found multiple critical bugs in Red Bull
  • Chaining multiple vulnerabilities for credential stealing
  • Blind account takeover
  • Turning cookie based XSS into account takeover
  • Blind os command injection
  • Five-minute hunting for hidden XSS
  • URL filter bypass, RFI and XSS
  • The forgotten API and XSS filter bypass
  • XSS via Angular Template Injection
  • Breaking things legally for fun and profit

Hackers' playground


https://www.tryhackme.com
https://www.pentesterlab.com
https://www.hackthebox.com
https://portswigger.net/web-security/all-labs
© 2025 Bergee's Stories on Bug Hunting