Summary

  • Ehteshamul Haq documents his experience uncovering a vulnerability through response manipulation whilst testing a client’s application.
  • He found several vulnerabilities which were categorised as P3, as well as a subdomain takeover issue, although this was marked as out of scope.
  • In spite of these challenges, setbacks and rejections are all part of the bug bounty hunter’s growth and experience.
  • Haq highlights how such CSS issues occur due to the manipulation of responses, and that Hunters must dig deeper into targets in order to uncover such bugs.
  • The full blog identifies tools such as Burp Suite and Mutateuchs for aiding in this methodology.

By Ehtesham Ul Haq

Original Article