<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Web Checklists on nix4cyber</title><link>/cheatsheets/bugbounty/web/</link><description>Recent content in Web Checklists on nix4cyber</description><generator>Hugo</generator><language>en</language><copyright>Copyright (c) 2025 nix4cyber</copyright><atom:link href="/cheatsheets/bugbounty/web/index.xml" rel="self" type="application/rss+xml"/><item><title>403 Forbidden Bypass</title><link>/cheatsheets/bugbounty/web/403-forbidden-bypass/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/bugbounty/web/403-forbidden-bypass/</guid><description>&lt;p>A 403 Forbidden bypass refers to techniques used to circumvent HTTP access control restrictions and gain unauthorized access to protected web resources.
These methods exploit server misconfigurations through header manipulation, path obfuscation, URL encoding, and cache poisoning to access restricted endpoints that normally return a 403 status code.&lt;/p></description></item><item><title>IDOR</title><link>/cheatsheets/bugbounty/web/idor/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/bugbounty/web/idor/</guid><description>&lt;h2 id="idor-insecure-direct-object-reference">IDOR (Insecure Direct Object Reference)&lt;/h2>
&lt;p>&lt;strong>IDOR&lt;/strong> is an access control vulnerability where an application uses a &lt;strong>direct identifier&lt;/strong> (like an account number or user ID) without properly verifying if the requesting user is authorized to access it.&lt;/p></description></item><item><title>Open-Redirects</title><link>/cheatsheets/bugbounty/web/open-redirects/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/bugbounty/web/open-redirects/</guid><description>&lt;h2 id="how-to-find-entry-points-to-test">How to find entry points to test?&lt;/h2>
&lt;ul>
&lt;li>
&lt;p>Caido HTTP history (look at URLs with parameters)&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;a href="/cheatsheets/osint/google-dorks">Google dorking&lt;/a>&lt;/p>



&lt;div class="expressive-code">
 &lt;figure class="frame not-content">
 &lt;figcaption class="header">
 &lt;span class="title">&lt;/span>
 &lt;/figcaption>
 &lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-txt" data-lang="txt">&lt;span class="line">&lt;span class="cl">site:target.com inurl:(go= OR return= OR r_url= OR returnUrl= OR returnUri= OR locationUrl= OR goTo= OR return_url= OR next= OR continue= OR checkout_url= OR dest= OR destination= OR image_url= OR redirect= OR redir= OR return_path= OR return_to= OR rurl= OR target= OR view=)&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>
 &lt;/figure>
&lt;/div>
&lt;/li>
&lt;li>
&lt;p>Functionalities usually associated with redirects:&lt;/p></description></item></channel></rss>