Broken Link hijacking — What it is and how to get bounties with it! $$$

When I started looking for bug bounty, I became interested in all URL-related vulnerabilities. Broken link hijacking (short BLH) is one of my favorite and easy to exploit/discover vulnerabilities. Since I started, I have found some.
This post aims to give you a basic overview of the different issues that could possibly arise if a target links to an expired endpoint.

--

--

--

All about Cybersecurity

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

🚨 Airdrop: BinaryX (BNX)

Identity meets GDPR, privacy, accessibility and usability

The Challenge of Online Identity: First things First!

Unauthorized access to admin setpassword page BY bypass 403 Forbidden

There’s No Place Like ::1 — Enumerating Local IPv6 networks

SensiPass Re-imagining Knowledge Based Authentication

{UPDATE} 公主的舞會 皇家女孩換裝打扮 Hack Free Resources Generator

How to Use Alternate Data Streams in Data Loss Prevention

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Proviesec

Proviesec

All about Cybersecurity

More from Medium

Hunting for Bugs in Shopping/Billing Feature.

IDOR leads to 2fa Bypass

The Password Bypass Leads to Full-Account-Takeover

Hacking into Admin Panel of U.S Federal government system : C.A.R.S -without credentials.