Open in app

Sign In

Write

Sign In

Mike Takahashi
Mike Takahashi

1.5K Followers

Home

About

Published in

InfoSec Write-ups

·Apr 20

10 Google Dorks for Sensitive Data

Discover Exposed Documents on Cloud Platforms with Google Dorks for Cybersecurity — 1. Google Docs 📄 Unearth sensitive data just by swapping example.com with your target: site:docs.google.com inurl:"/d/" "example.com" 2. OneDrive ☁️ Microsoft’s cloud storage solution for files and photos. Score big by finding internal presentations and private photos that were accidentally made public: site:onedrive.live.com "example.com"

Bug Bounty

3 min read

10 Google Dorks for Sensitive Data
10 Google Dorks for Sensitive Data
Bug Bounty

3 min read


Published in

InfoSec Write-ups

·Apr 3

6 Burp Suite Tips & Tricks

Turbocharge your web application security testing, bug bounty hunting, and pentesting with these essential Burp Suite configuration hacks — Welcome, fellow hacking enthusiasts! Today, we’re diving deep into the world of Burp Suite, the popular web security testing tool, to help you supercharge your workflow. Let’s get started! 1. Disable Interception at the Start 🚫 Ever fired up Burp Suite, all geared up to hack away, but somehow, it just doesn’t seem to cooperate? Until it…

Bug Bounty

4 min read

6 Burp Suite Tips & Tricks
6 Burp Suite Tips & Tricks
Bug Bounty

4 min read


Published in

InfoSec Write-ups

·Mar 26

The Ultimate XSS PoC with ChatGPT-4 🎯

XSS to Demonstrate Stealing Cookies, Local Storage, and Page Content Generated with ChatGPT-4 🤖 — Welcome, fellow vulnerability hunters! Today, we’re going to explore a simple yet powerful way to demonstrate Cross-Site Scripting (XSS) vulnerabilities using a Proof of Concept (PoC) generated with ChatGPT model GPT-4. Get ready to level up your ethical hacking skills! Step 1: The Prompt 📝 Let’s start with a killer prompt that’ll set the foundation…

Bug Bounty

4 min read

The Ultimate XSS PoC with ChatGPT-4 🎯
The Ultimate XSS PoC with ChatGPT-4 🎯
Bug Bounty

4 min read


Published in

InfoSec Write-ups

·Mar 13

XXE with ChatGPT

Generate Custom XXE Payloads with AI — XXE (XML External Entity) is a type of vulnerability that allows attackers to inject malicious XML code into an application. The following ChatGPT prompts can make it easy to generate payloads for bug bounty and penetration testing. 1. Basic XXE To get started, let’s start with a basic XXE payload customized for the…

Bug Bounty

3 min read

XXE with ChatGPT
XXE with ChatGPT
Bug Bounty

3 min read


Published in

InfoSec Write-ups

·Mar 7

5 ChatGPT Prompts for Bug Bounty

JS, XSS, CSRF, and Decoding Made Easy with ChatGPT — Are you a bug bounty hunter, penetration tester, or developer, but looking for ways to augment your abilities with the power of AI? You are in luck because ChatGPT can assist you in the following ways. 1. AI-powered Scan for Vulnerabilities in Javascript Javascript can be complicated and time-consuming to read, but is a gold mine for…

Bug Bounty

3 min read

5 ChatGPT Prompts for Bug Bounty
5 ChatGPT Prompts for Bug Bounty
Bug Bounty

3 min read


Published in

InfoSec Write-ups

·Mar 3

Create Your Own XSS Lab with ChatGPT

Get up and running quickly with this easy-to-follow tutorial on creating and running your own custom XSS lab with ChatGPT. — Having trouble learning a vulnerability type? Just have ChatGPT make you a lab! 1. What do you want to learn? DOM XSS is a popular vulnerability type to hunt for because they’re everywhere, hard to scan for, and typically have high rewards. Prompt: Create a fully working lab html for DOM XSS to test against locally in…

Bug Bounty

3 min read

Create Your Own XSS Lab with ChatGPT
Create Your Own XSS Lab with ChatGPT
Bug Bounty

3 min read


Published in

InfoSec Write-ups

·Feb 27

ChatGPT for Bug Bounty: Faster Hunting and Reporting

Save Time, Learn Technical Skills, and Write Effective Reports with AI-Powered ChatGPT — If you’re new to bug bounty, or just looking to up your game, look no further than ChatGPT. Brainstorm When you’re starting out as a bug bounty hunter, it can be overwhelming to know where to begin. Ask ChatGPT to help you brainstorm ways to augment your abilities and save time…

Bug Bounty

3 min read

ChatGPT for Bug Bounty: Faster Hunting and Reporting
ChatGPT for Bug Bounty: Faster Hunting and Reporting
Bug Bounty

3 min read


Published in

InfoSec Write-ups

·Feb 7

Reveal the Cloud with Google Dorks

Find sensitive data in Amazon AWS, Google Cloud, and more — Special Google searches called “dorks” can be used to reveal sensitive data and identify targets for bug bounty hunting and penetration testing. Cloud Storage Dorks Cloud storage services like Amazon S3, Microsoft Azure Blob Storage, Google Cloud, and Google Drive can often contain sensitive information. To find buckets and sensitive data, use the…

Bug Bounty

3 min read

Reveal the Cloud with Google Dorks
Reveal the Cloud with Google Dorks
Bug Bounty

3 min read


Published in

InfoSec Write-ups

·Feb 3

How to Get Into Cybersecurity in 2023: A Step-by-Step Guide

Unlocking the Secrets to a Successful Cybersecurity Career: A Step-by-Step Guide for Beginners — If you’re excited by cybersecurity, hacking, bug bounty, or penetration testing, and want to get into it full-time, this guide is for you. Focus on how to make yourself more valuable in cybersecurity by hacking and coding, not through certifications or degrees. 1. Hands-on Training Get Savvy with Linux and Bash Scripting

Infosec

6 min read

Get Into Cybersecurity in 2023: A Step-by-Step Guide
Get Into Cybersecurity in 2023: A Step-by-Step Guide
Infosec

6 min read


Published in

InfoSec Write-ups

·Jan 16

Tips for BAC and IDOR Vulnerabilities

Step-by-step guide for uncovering Broken Access Control and Indirect Object Reference vulnerabilities for bug bounty hunters and pentesters. — Introduction As bug bounty hunters and pentesters, one of the most rewarding vulnerabilities to uncover are Broken Access Control (BAC) and Insecure Direct Object Reference (IDOR). In this article, we’ll discuss what BAC and IDOR vulnerabilities are, basic testing methodology, IDOR with UUID, Blind IDOR, and automating with the Auth Analyzer…

Bug Bounty

5 min read

Tips for BAC and IDOR Vulnerabilities
Tips for BAC and IDOR Vulnerabilities
Bug Bounty

5 min read

Mike Takahashi

Mike Takahashi

1.5K Followers

Pentester | Bug Bounty Hunter | AppSec | AI Whisperer https://twitter.com/TakSec

Following
  • Carl Cheng

    Carl Cheng

  • Rahil C.

    Rahil C.

  • John Newmark

    John Newmark

  • Victor Oschi

    Victor Oschi

  • Ahmet Göker

    Ahmet Göker

See all (787)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams