-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Bug Bounty Hunting Essentials
By :
Now, we'll look at some real examples of XXEs and how they have been exploited in bounty programs.
On April 11th, 2014, researchers from the Detectify security team reported a vulnerability in the Google search engine.
The reasons they selected the Google search engine to look for vulnerabilities were as follows:
So, they started to doing searches using Google Search:

Using searching techniques, they found some interesting systems and software. But they put their attention to the Google Toolbar button gallery. This was a personalized toolbar to manage Google buttons; the users could personalize it with new buttons or edit the existing ones. The Detectify team considered it a very...
Change the font size
Change margin width
Change background colour