👨‍💻👾👨‍💻👾👨‍💻👾

Search

SearchSearch
          • 7e-Discover Origin IP Address
          • 403 Bypass Automation
          • Account Takeover via Hidden Parameters
          • Broken Link Hijacking
          • Click Jacking
          • Clipboard Enabled
          • EXIF Geolocation Data not Stripped From Uploaded Images
          • JWT Tokens Email Disclosure
          • No Rate Limit
          • Password Link over HTTP
          • Profile Image Not Deleted
          • Subdomain Takeover
          • Token Not Validated After Usage
          • WP and Drupal Simple P1 Bug
          • XSS to ATO
        • 1-Find Seeds
        • 2-Subdomain Scrapping
        • 3-Github Dorking
        • 4-List Hosts
        • 5-Burp Suite Set Up
        • 6-Endpoints Discovery
        • 7-GF Patterns
        • 8-Endpoints Enumeration
        • 8-GF Automation
        • 9-Live Hosts Enumeration
        • Find Target
        • Hall of Fame
      • README
        • CVE-2024-6066
        • CVE-2024-6067
        • CVE-2024-6213
        • CVE-2024-6214
        • CVE-2024-6215
        • CVE-2024-6216
        • CVE-2024-6217
        • CVE-2024-6418
        • CVE-2024-6419
        • CVE-2024-7942
        • CVE-2024-7948
        • CVE-2024-8140
        • CVE-2024-8141
        • CVE-2024-8142
        • CVE-2024-8151
        • CVE-2024-8152
        • CVE-2024-8153
        • CVE-2024-8154
        • CVE-2024-8170
        • CVE-2024-8172
        • CVE-2024-8380
        • CVE-2024-9092
        • CVE-2024-9093
        • CVE-2024-10153
        • CVE-2024-10154
        • CVE-2024-10155
        • CVE-2024-10156
        • CVE-2024-10157
        • CVE-2024-10158
        • CVE-2024-10159
        • CVE-2024-10160
        • CVE-2024-10161
        • CVE-2024-10162
        • CVE-2024-10191
        • CVE-2024-10192
        • CVE-2024-10414
        • CVE-2024-10423
        • CVE-2024-10424
        • CVE-2024-10425
        • CVE-2024-10432
        • CVE-2024-10433
        • CVE-2024-10446
        • CVE-2024-10447
      • README
        • HTB - Cronos
        • HTB- WifineticTwo
        • HTB-Bitlab
        • HTB-Blurry
        • HTB-Boardlight
        • HTB-BountyHunter
        • HTB-Cap
        • HTB-Editorial
        • HTB-Forge
        • HTB-FormulaX
        • HTB-GoodGames
        • HTB-GreenHorn
        • HTB-Headless
        • HTB-IClean
        • HTB-Intuition
        • HTB-Jarvis
        • HTB-Lightweight
        • HTB-MagicGardens
        • HTB-MetaTwo
        • HTB-Nibbles
        • HTB-Node
        • HTB-October
        • HTB-Pandora
        • HTB-Perfection
        • HTB-PermX
        • HTB-Poison
        • HTB-Runner
        • HTB-Sea
        • HTB-Skyfall
        • HTB-Solidstate
        • HTB-Usage
        • HTB-Vault
        • HTB- Silo
        • HTB-Access
        • HTB-Active
        • HTB-Atom
        • HTB-Axlle
        • HTB-Blackfield
        • HTB-Cascade
        • HTB-Chatterbox
        • HTB-Control
        • HTB-Crafty
        • HTB-Forest
        • HTB-Freelancer
        • HTB-Fuse
        • HTB-Jab
        • HTB-Jeeves
        • HTB-Love
        • HTB-Mailing
        • HTB-Mist
        • HTB-Monteverde
        • HTB-Netmon
        • HTB-Object
        • HTB-Office
        • HTB-Pov
        • HTB-Querier
        • HTB-Reel
        • HTB-Remote
        • HTB-Resolute
        • HTB-Sauna
        • HTB-Solarlab
        • HTB-Worker
      • README
      • Cybersecurity Companies (Might apply one day)
          • a-Introduction
          • b-External Recon
          • c-Internal Recon
          • a-LLMNR/NBT-NS Poisoning - Responder
          • b-LLMNR/NBT-NS Poisoning - Inveigh
          • a-Password Policy Enumeration
          • b-Create Target User List
          • c-Password Spraying - Linux
          • d-Password Spraying - Windows
          • a-Security Control Enumeration
          • b-Enumeration from beachhead - Linux
          • c-Enumeration from beachhead - Windows
          • d-Enumeration Without Tools
          • a-Kerberoasting from Linux
          • b-Kerberoasting from Windows
          • a-ACL Overview
          • b-ACL Enumeration
          • c-ACL Abuse
          • d-DCSync Attack
            • a-NoPac
            • b-PrintNightmare
            • c-PetitPotam
          • a-Privileged Access
          • b-Kerberos "Double Hop" Problem
          • d-Misconfigurations
        • File Transfer - Linux
        • File Transfer - More
        • File Transfer - Protected
        • File Transfer - Windows
        • File Transfer with code
          • Attacking LSASS
          • Attacking NTDS.dit
          • Attacking SAM
        • Linux Persistence
        • Windows Persistence
          • Socat Bind Shell
          • Socat Reverse Shell
          • DNS Tunneling - Dnscat2
          • ICMP Tunneling - SOCKS
          • SOCKS5 - Chisel
          • Sshuttle
          • Web Server - Rpivot
          • Windows - Netsh
          • Windows - plink.exe
        • a-Discovery and Scan
        • b-Port Forwarding
        • c-Dynamic Port Forwarding
        • d-Reverse Port Forwarding w SSH
        • e-Meterpreter Tunneling
        • Crack Linux Hash
        • Credential Hunting
        • Interactive Shell
        • Linux Privilege Escalation
        • Pass the Hash
        • Pass the Ticket - Linux
        • Pass the Ticket - Windows
        • Windows Privilege Escalation
        • Email Services
        • Port 21 - FTP
        • Port 53 - DNS
        • Port 80 - HTTP
        • Port 88 - Kerberos
        • Port 139,445 - SMB
        • Port 389 - LDAP
        • Port 445 - RPC
        • Port 1433 - MSSQL
        • Port 3306 - MySQL
        • Port 3389 - RDP
        • UDP 161 - SNMP
        • a-HyperText Transfer Protocol(HTTP)
        • b-Hypertest Transfer Protocol Secure (HTTPS)
        • c-HTTP Requests and Responses
        • d-HTTP Headers
        • e-Methods and Codes
        • M1-GET
        • M2-POST
        • M3-CRUD API
          • a-Common Web Vulns
          • a-Sensitive Data Exposure
          • b-HTML Injection
          • c-Cross Site Request Forgery (CSRF)
          • c-XSS
        • a-intro
        • b-Layout
        • c-Front End Back End
        • d-HTML
        • d-JavaScript
        • e-CSS
        • f-Web Servers
        • g-Databases
        • h-Development and APIs
        • a-Proxy Tools
        • a-Fuff
        • a-intro
        • b-Basic Obfuscation
        • c-Advanced Obfuscation
        • d-Deobfuscation
        • e-Decoding
          • a-Defacing
          • b-Phishing
          • c-Sessions Hijacking
        • a-Intro
        • b-Stored XSS
        • c-Reflected XSS
        • d-DOM XSS
        • e-XSS Discovery
        • f-XSS Prevention
          • a-Database Enumeration
          • b-Reading Files
          • c-Writing Files
          • a-Intro
          • b-SQL Basics
          • a-intro
          • b-Basics
          • c-Enumeration
          • d-OS Exploitation
        • a-intro
        • b-SQLi Basics
        • c-Subvert Query Logic
        • d-Using Comments
        • e-Union Clause
        • f-Mitigation
          • a-Detection
          • b-Injecting Commands
          • a-Identify Filters
          • b-Bypass Space Filters
          • Bypass Blacklisted Commands
          • c-Bypass Other Blacklisted Characters
          • e-Advanced Command Obfuscation
          • f-Evasion Tools
        • a-intro
        • b-Prevention
          • a-Client-Side Validation
          • b-Blacklist Filters
          • c-Whitelist Filters
          • d-Type Filters
          • e-Limited File Uploads
          • f-Other Upload Attacks
          • Tips
        • a-Shell
        • b-Prevention
          • a-intro
          • b-SSI Injection
          • a-intro
          • b-Identify SSRF
          • c-Exploit SSRF
          • d-Blind SSRF
          • a-Intro
          • b-Identify SSTI
          • c-Jinja2
          • d-Twig
          • e-SSTImap
          • a-intro
          • b-Exploit XSLT Injection
        • a-Intro
        • a-Intro
        • b-Default Passwords
        • c-Username Bruteforce
        • d-Hydra Modules
        • e-Personalized Wordlists
        • f-Service Authentication Bruteforce
          • a-Via Direct Access
          • b-Via Parameter Modification
          • a-User Enumeration
          • c-Bruteforce Password Reset Tokens
          • d-Bruteforce 2FA Codes
          • e-Weak Bruteforce Protection
          • Password Bruteforce
          • a-Default Credentials
          • b-Vulnerable Password Reset
          • a-Session Tokens
          • b-Further Session Attacks
        • a-Intro
          • a-intro
          • b-Bypass Basic Authentication
          • c-Bypass Security Filters
          • d-Prevention
          • a-Intro
          • b-Identify IDOR
          • c-Mass IDOR Enumeration
          • d-Bypass Encoded References
          • e-IDOR in Insecure APIs
          • f-Chaining IDORs
          • a-intro
          • b-Local File Disclosure
          • c-Advanced File Disclosure
          • d-Blind Data Exfiltration
        • a-Intro
          • a-Automated Scanning
          • b-Prevention
          • a-LFI
          • b-Basic Bypasses
          • c-PHP Filters
          • a-PHP Wrappers
          • b-RFI
          • c-LFI and File Uploads
          • d-Log Poisoning
        • a-intro
          • a-Session Hijacking
          • b-Session Fixation
          • c-Obtain Session Identifier wo User Interaction
          • d-XSS
          • e-CSRF
          • f-GET Based CSRF
          • g-POST Based CSRF
          • h-Chain XSS CSRF
          • i-Weak CSRF Tokens
          • j-Bypasses
          • k-Open Redirect
        • a-intro
          • a-Attack Wordpress xmlrpc.php
          • c-Arbitrary File Upload
          • d-LFI
          • e-SSRF
          • e-XSS
          • g-ReDos
          • h-XXE
          • Information Disclosure w SQLi
        • a-intro
        • b-WSDL
        • c-SOAPAction Spoofing
        • d-Command Injection
          • a-WP Core Version Enumeration
          • b-Plugins and Themes Enumeration
          • c-Directory Indexing
          • d-User Enumeration
          • e-Login
          • f-WPScan
          • a-Vulnerable Plugin
          • b-Attacker User
          • c-RCE
          • d-WP and Metasploit
        • a-intro
        • a-Bug Bounty Programs
        • b-Writing Report
    Home

    ❯

    Bug_Bounty

    ❯

    Methodology

    ❯

    Low_Hangers

    ❯

    EXIF Geolocation Data not Stripped From Uploaded Images

    EXIF Geolocation Data not Stripped From Uploaded Images

    Jan 07, 20251 min read

    • exif
    • p3

    Example H1 Reports:

    • https://hackerone.com/reports/615336
    • https://hackerone.com/reports/446238
    1. Go to target website and create an account.
    2. Copy the path to the uploaded profile picture.
    3. Go to jimpl and paste the URL.
    4. If Geolocation is found → Report.

    Graph View

    Backlinks

    • No backlinks found

    Created with Quartz v4.2.3 © 2025

    • GitHub
    • Discord Community