Latest Posts

Bountycon 2022 - Android Trinity - PWN
Whilst working on the BountyCon 2022 CTF, I spent the majority of the time focusing on the Android Trinity challenge. This was one of two PWN...

Disclosing BCC Recipients of an email
This post will cover an interesting logic flaw found in a private bug bounty program. Whilst the name of this company will be known as...

Abusing Facebooks Call To Action to launch internal deeplinks
Ever noticed that big blue button on the top of every Facebook page? This feature, known as Call to action or CTA is designed for user...

Open redirects are not dead! Or are they?
Over the last few years doing bug bounties, it's becoming more and more common for companies to reject reports about Open Redirects. Once upon a...

Bypass Microsoft Teams Tenancy Permission - Edit Sent Messages
Back in December 2019 I reported a Microsoft Teams Tenancy Permission bypass that allowed a user to modify...

Abusing corporate URL shorteners
URL shorteners are great! They allows users to turn a 200 character url into something substansially less. It's ideal for those...