Open Bug Bounty selected among the
Top 5 Bug Bounty programs to watch
in 2021 by The Hacker News

For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
940,408 coordinated disclosures
563,445 fixed vulnerabilities
1306 bug bounties with 2,609 websites
22,373 researchers, 1296 honor badges

febin_rev | Security Researcher Profile


Security researcher febin_rev has already helped fix 24 vulnerabilities.



Researcher reputation:  130

Real name:
Febin

About me:
Passionate hacker, security researcher and a bug hunter. Working hard for knowledge and to improve myself.

PayPal : paypal.me/febinrev

[email protected]

Contact email:
E-mail: [email protected]
Phone: 91 8270920043

Alternative Contacts:
[email protected]
twitter.com/febinrev

Certifications & Diplomas:
Fortinet nse 1,2
CyberArk trustee
Networking
Linux administration
CNSS
Autopsy forensics

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Money , Accessories , Thanks , recommendation. Anything You like to gift me for my responsible report.


PayPal : paypal.me/febinrev

Halls of Fame:
bugcrowd.com/fitbit/hall-of-fame
bugcrowd.com/indeed/hall-of-fame
litmind.com/bughunters
Nokia HOF : https://www.nokia.com/notices/responsible-disclosure/

Follow me on:
Twitter

Recommendations and Acknowledgements

@w3c_systeam     7 October, 2020
    Twitter w3c_systeam Systeam from W3C:
Thank you Febin for your clear and concise report and proof of concept that allowed us to close an SSRF to internal port scanning issue in one of our services.
@lorenzoherrera     16 September, 2020
    Twitter lorenzoherrera Loren from Litmind:
Febin has found many bugs in our site and helped us solving them by providing comprehensive proof of concept, screenshots and details. He earned a place of honor in our bug hunters hall of fame: https://www.litmind.com/bughunters
@lorenzoherrera     5 October, 2020
    Twitter lorenzoherrera Loren from Litmind:
Febin has found a bunch of vulnerabilities related to the lack of CSRF request authentication. Thanks to his reports our site is now more secure! Thank you!
@GoSportsa     21 September, 2020
    Twitter GoSportsa Rick from Sportsa.com:
Febin discovered that our security.txt wasn't configured correctly and pointed to an outdated page. He provided a quick message, showed the issue. Thank you!

https://sportsa.com
@wall26com     15 September, 2020
    Twitter wall26com Wall26 from Wall26:
Thanks for finding and reporting a business logic issue of our service.
@lorenzoherrera     14 September, 2020
    Twitter lorenzoherrera Loren from Photolancers:
Thanks febin_rev for your kind report! You've discovered a CSRF vulnerability in our site thanks and we've been able to solve it thanks to your help. So grateful, cheers!
@wall26com     19 August, 2020
    Twitter wall26com Wall26 from wall26:
Thank you for reporting CSRF issue of our website.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:97
Total reports on VIP sites:17
Total patched vulnerabilities:24
Recommendations received:7
Active since:29.06.2020

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions


28.03.2021  Windows Stack Buffer Overflow in a real life app — Exploit development — CloudMe_1.11.2 Buffer Overflow-CVE-2018–6892

CloudMe 1.11.2 Buffer OverFlow - Exploit Development.

Febin

Hi,

This is Febin,

Twitter : febinrev

In this Post , I am gonna demonstrate windows Stack buffer overflow and exploit development in CloudMe 1.11.2 .

CloudMe is a cloud storage service. This buffer overflow vulnerability was patched and the exploit is released publicly in 2018 (CVE-2018–6892).

This is a Local Privilege Escalation Vulnerability

This demo will help guys who are preparing for OSCP or equivalent Certifications and also help guys (like me!) who wanna learn advanced hacking and exploit development. There are some executables/apps like “vulnserver” that are intentionally built to be vulnerable for educational purposes, but this is a real life application. So, basically we are developing a real exploit and attacking a real app.

Lets Go!

14.09.2020  How to find valid and impactful CSRFs

  Latest Patched

 20.04.2021 avizo.me
 20.04.2021 onex.am
 20.04.2021 kaldo.am
 20.04.2021 checkchick.me
 20.04.2021 dramaqu.website
 20.04.2021 newharmony-in.gov
 20.04.2021 vietnamtourism.gov.vn
 20.04.2021 lucknow.me
 20.04.2021 namlh.me
 20.04.2021 wmsc.gov

  Latest Blog Posts

11.04.2021 by Open Bug Bounty
Better Notifications Mechanism
28.03.2021 by febin_rev
Windows Stack Buffer Overflow in a real life app — Exploit development — CloudMe_1.11.2 Buffer Overflow-CVE-2018–6892
10.02.2021 by Renzi25031469
Sysadminotaur nº88
10.02.2021 by Open Bug Bounty
Higher Submissions Quality Standard
25.12.2020 by _Y000_
How to bypass mod_security (WAF)

  Recent Recommendations

@MrMoney84315336     16 April, 2021
    Twitter MrMoney84315336:
Serious, fast and professional.Thanks for the report.
@lmanunza     15 April, 2021
    Twitter lmanunza:
The Researcher found an XSS vulnerability in our site and acted ethically by reporting it to us, so we could fix it in a timely manner. Thank you!
@studentdoctor     14 April, 2021
    Twitter studentdoctor:
Rngdr4 is an absolute professional. Very helpful in finding and helping to resolve our bug. Highly recommended! Thanks, rngdr4!
@lmanunza     13 April, 2021
    Twitter lmanunza:
Pooja found an XSS vulnerability in our website and acted ethically by reporting it to us, as well as providing all the information we needed to reproduce and fix the issue in a timely manner. Thank you very much!
@MrMoney84315336     13 April, 2021
    Twitter MrMoney84315336:
Thank you for reporting the XSS issue.
Thanks to the detailed report, we were able to fix the problem on the same day.