بچه ها رایتاپ امید و برنا جز ۱۰ رایتاپ وب هکینگ توی پورت سوییگر شده
حتما اگه خوشتون اومد حمایت کنین:
https://portswigger.net/polls/top-10-web-hacking-techniques-2024
حتما اگه خوشتون اومد حمایت کنین:
https://portswigger.net/polls/top-10-web-hacking-techniques-2024
portswigger.net
Top 10 web hacking techniques of 2024
Welcome to the community vote for the Top 10 Web Hacking Techniques of 2024.
❤13
7 Overlooked recon techniques to find more vulnerabilities
https://www.intigriti.com/researchers/blog/hacking-tools/7-overlooked-recon-techniques-to-find-more-vulnerabilities
https://www.intigriti.com/researchers/blog/hacking-tools/7-overlooked-recon-techniques-to-find-more-vulnerabilities
Intigriti
7 Overlooked recon techniques to find more vulnerabilities
Reconnaissance is an important phase in bug bounty and in pentesting in general. As every target is unique and as we often do not have access to the code base, we'd need to come up with unique methods...
👍2
💻 All About Bug Bounty - Updated!
🔥https://github.com/daffainfo/AllAboutBugBounty
🔥https://github.com/daffainfo/AllAboutBugBounty
1-Click Account Takeover (ATO) via CORS Misconfiguration: https://medium.com/@mohammed01550038865/1-click-account-takeover-ato-via-cors-misconfiguration-64dc26d24917?source=rss------bug_bounty-5
Medium
1-Click Account Takeover (ATO) via CORS Misconfiguration
Hello All, Today, I will share an important write-up I found on a private bug bounty on Bugcrowd. I will refer to my victim target as…
Mastering Bug Bounty Recon: Essential Techniques for Ethical Hackers: https://medium.com/@verylazytech/mastering-bug-bounty-recon-essential-techniques-for-ethical-hackers-549c5b472975?source=rss------bug_bounty-5
Medium
Mastering Bug Bounty Recon: Essential Techniques for Ethical Hackers
The first step to attacking any target is conducting reconnaissance, or simply put, gathering information about the target. Reconnaissance…
OAuth Account Hijacking via redirect_uri: https://osintteam.blog/oauth-account-hijacking-via-redirect-uri-ae8ca7a66930?source=rss------bug_bounty-5
Medium
OAuth Account Hijacking via redirect_uri
Today, we’ll be walking through my step-by-step methodology as I approach an Oauth vulnerability. This is part of my Methodology…
How I Bypassed OTP Like a Devil, Leading to Full Account Takeover: https://infosecwriteups.com/how-i-bypassed-otp-like-a-devil-leading-to-full-account-takeover-7bb7a673f7a0?source=rss------bug_bounty-5
Medium
How I Bypassed OTP Like a Devil, Leading to Full Account Takeover
Introduction:
How I Earned Over 100 Points on HackerOne with Email Spoofing.: https://j0nasdias.medium.com/how-i-earned-over-100-points-on-hackerone-with-email-spoofing-1ae0c4bc6aba?source=rss------bug_bounty-5
Medium
How I Earned Over 100 Points on HackerOne with Email Spoofing.
Hello, my name is Jonas Dias Rebelo, I am currently 21 years old, born in Portugal and now residing in the USA (United States of America).
IDOR leads to leak private user’s data: https://medium.com/@banertheinrich/idor-leads-to-leak-private-users-data-3a2b59f58826?source=rss------bug_bounty-5
Medium
IDOR leads to leak private user’s data
Introduction بسم الله الرحمن الرحيم و الصلاة و السلام على أشرف المرسلين Hello! My name is Adham Heinrich, and this is my second write-up…