Close Menu
    What's Hot

    Why GRC Services Are Vital for Business Growth and Compliance in 2025

    July 1, 2025

    Ultimate Guide to Attack Surface Scanning

    April 10, 2025

    Recent Trends in Zero Trust Architecture

    March 3, 2025
    Facebook X (Twitter) Instagram LinkedIn WhatsApp
    HITH Blog – HackerinthehouseHITH Blog – Hackerinthehouse
    • Bug Bounty

      A Beginner’s guide to Active Directory Penetration Testing

      June 21, 2023

      Building an XSS Scanner with Python

      February 27, 2023

      Journey to Website Security: Uncovering Hyperlink Injection Dangers

      February 24, 2023

      File Upload XSS | Find XSS in a different way while doing Bug bounty and Pentesting

      January 13, 2023

      How To Find DOM-based XSS Vulnerability

      December 27, 2022
    • Pen Testing

      Privileged Escalation: How Hackers Exploit Permissions to Compromise Your Systems

      March 5, 2024

      The Ultimate Guide to Vulnerability Scanning

      December 13, 2023

      Top 10 Tools for Real World Red Teaming

      November 18, 2023

      Locking Down OAuth 2.0: Critical Steps to Protect User Accounts and Data

      November 10, 2023

      Detailed guide on Password Transmutations

      April 29, 2023
    • Cyber Security

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024

      A Comprehensive Guide on Cyber Security Services VS Cyber Security Products

      June 14, 2024
    • Services
    • Product
      • Certifications
    • More
      1. Ethical Hacking
      2. Kali Linux
      3. Write Ups
      4. CTF
      5. Blockchain
      6. Machine Learning
      7. Computer Science
      8. View All

      Journey to Website Security: Uncovering Hyperlink Injection Dangers

      February 24, 2023

      Pentest/VAPT RoE and Best Practices

      February 3, 2023

      Emoji Deploy Attack Chain

      January 24, 2023

      Introduction to Information Security

      January 11, 2023

      Cyber Security Roadmap (Part-2)

      October 25, 2022

      How to install waybacksurls in kali linux (2022)

      September 23, 2022

      How To Find Hidden Parameters

      November 12, 2022

      Top 10 Subdomain Takeover Reports

      November 6, 2022

      Pause DeSync Attack :

      November 3, 2022

      Bypassing OTP Verification Methods

      October 31, 2022

      Tryhackme Vulnversity walkthrough

      September 26, 2022

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024

      A Peek into Facial Recognition Technology

      August 21, 2023

      How Data Scientists and Machine Learning Engineers Differs

      November 8, 2022

      Artificial Neural Networks with ML

      November 4, 2022

      INTRODUCTION TO MACHINE LEARNING

      October 20, 2022

      Robotic Process Automation: The Key to Effortless Efficiency

      September 18, 2024

      BCI: Merging Minds With Machines

      August 18, 2023

      Is Quantum Computing the future of Computing?

      August 16, 2023

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024
    HITH Blog – HackerinthehouseHITH Blog – Hackerinthehouse
    Home»Bug Bounty»How To Find Hidden Parameters
    Bug Bounty

    How To Find Hidden Parameters

    By KRiPPto99November 12, 2022Updated:November 12, 2022No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Finding hidden Parameters for bug bounty

    Well!!! Hello everyone! It’s KRiPPto99 Back again I hope you all doing very well. Today we in blog I am going to show you How to find the Hidden Parameters in web application. But Before Get started lets know

    Why find Hidden parameters ?

    Hidden parameters may allow an attacker to control the behavior of the application and may results in the execution of successfully attack In simple words to find more bugs

    Lets take a example: lets guess there is web application called examplesite.com that has endpoint:

    https://example.com/user/.js?isUser=1  

    This endpoint basically allows users to access their dashboard as a normal user. so my question is what if there is some other parameters that are being used to be like isAdmin or something else for example:

    https://example.com/user/.js?isAdmin=1

    Now we get understand why its important for us to find hidden parameters lets see now how to find hidden parameters

     

    How to find hidden parameters

    TO find hidden parameters there are many tools like PARAMSPIDER, PARAMMINER, ARJUN here we use ARJUN

    Lets quickly open our kali terminal and to install

    sudo apt install arjun -y
    

    Now after installing tool let us check tool features by giving command of -h arjun -h

    arjun -h
    

     

    options:

    • -h, –help show this help message and exit
    • -u URL Target URL
    • -d DELAY Delay between requests in seconds. (default: 0)
    • -t THREADS Number of concurrent threads. (default: 2)
    • -w WORDLIST Wordlist file path. (default:
    • {arjundir}/db/default.txt)
      -m METHOD Request method to use: GET/POST/XML/JSON. (default:GET)
    • -i [IMPORT_FILE] Import target URLs from file.
    • -T TIMEOUT HTTP request timeout in seconds. (default: 15)
    • -c CHUNKS Chunk size. The number of parameters to be sent at
      once
    • -q Quiet mode. No output.
    • –headers [HEADERS] Add headers. Separate multiple headers with a new line.

     

    Let us try to use this tool from the above information on http://testphp.vulnweb.com/artists.php

    arjun -u http://testphp.vulnweb.com/artists.php -m GET
    
    

     

    As we can see, We got 3 parameters from ARJUN! Now we can test these parameters for further vulnerabilities.

     

    Thats it for today guys seeeyaa byee

    Author

    • KRiPPto99

      View all posts

    bugbounty Cyber-Security Ethical-Hacking hidden parameters hiddenparameters how to hidden parameters how to start bugbounty
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleA guide to Browser in the Browser Attack
    Next Article Session Fixation, Session Hijacking and Captcha Bypass
    KRiPPto99

    Related Posts

    Cyber Security

    Why GRC Services Are Vital for Business Growth and Compliance in 2025

    July 1, 2025
    Cyber Security

    Ultimate Guide to Attack Surface Scanning

    April 10, 2025
    Cyber Security

    Recent Trends in Zero Trust Architecture

    March 3, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    How to install waybacksurls in kali linux (2022)

    September 23, 20222,617 Views

    File Upload XSS | Find XSS in a different way while doing Bug bounty and Pentesting

    January 13, 2023923 Views

    OSCP Cheat Sheet

    October 16, 2022876 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Advertisement
    X (Twitter) Instagram LinkedIn WhatsApp Telegram
    • About us
    • Contact Us
    • Privacy Policy
    • Terms
    © 2025 HITH Blog. Powered by Hackerinthehouse.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.