# Fast Tips & Tricks

***

### Fast Trick 💡 (Web)

If you’re testing a program that uses **Organizations (ORG)** and has an **invitation feature**, always inspect the **invitation link** sent to the invited user’s inbox.

#### What to Check

After receiving the invite email, look at the URL parameters.\
If you see something like an **encoded data in a  parameter**, that’s your signal.

#### Example

```
https://app.target.com/...?
data=eyJwYWdlIjogeyJwYXRoIjogIi9zZXR0aW5ncy90ZWFtL21lbWJlcnMvIiwg...
```

#### Quick Test

Try Base64-decoding the value.

#### Possible Result

You may find a JSON object like this:

```
{
  "page": {
    "path": "/settings/team/members/",
    "referrer": "",
    "search": "",
    "title": "Settings – Team - Members | Target",
    "url": "https://app.target.com/settings/team/members/"
  },
  "campaign": {},
  "gtag_client_id": "1099207148.1763147219",
  "gtag_session_id": "1766775997",
  "gtag_session_number": 24,
  "ip": "105.192.107.6",
  "userAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:147.0) Gecko/20100101 Firefox/147.0"
}
```

#### Impact

An attacker who receives the invitation link can:

* Identify the inviter’s **IP address**
* Infer **approximate geographic location**
* Determine **OS, browser, and device type**
* Use the data for fingerprinting or targeted attacks

***

### Fast Mobile Trick 📱

When testing a **mobile application (Android)**, always check **local data storage**.\
Many apps still store **sensitive data in plaintext** inside local databases.

#### What to Check

After logging in or registering a user, inspect the app’s local files:

* SQLite databases
* SharedPreferences
* Cache / files directories

#### Example (Android)

Target package:

```
com.target.app
```

Database location:

```
/data/data/com.target.app/databases/
```

#### Quick Test

Using a rooted device or ADB-enabled environment:

```
adb root
adb shell
cd /data/data/com.target.app/databases/
ls
cat DataBaseFile
```

#### Possible Findings

You may discover sensitive data stored **without encryption**, such as:

* User **email address**
* **Passwords stored in plaintext**
* **Valid authentication / session tokens**
* Other **PII**

#### Impact

An attacker with local access can:

* Take over user accounts
* Hijack active sessions via extracted tokens
* Perform unauthorized actions (bookings, changes, purchases)
* Harvest PII and reuse credentials elsewhere

####


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://get-bountyordie.gitbook.io/get-bountyordie-docs/fast-tips-and-tricks.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
