Critical SQL Injection Vulnerability in Apache Traffic Control: https://medium.com/@wiretor/critical-sql-injection-vulnerability-in-apache-traffic-control-a28cedca8b93?source=rss------bug_bounty-5
Medium
🚨 Critical SQL Injection Vulnerability in Apache Traffic Control 🚨
WIRE TOR — The Ethical Hacking Services
Apache Traffic Control Vulnerability Let Attackers Inject Malicious SQL Commands: https://mhmmuneef.medium.com/apache-traffic-control-vulnerability-let-attackers-inject-malicious-sql-commands-66188cbcd84d?source=rss------bug_bounty-5
Medium
Apache Traffic Control Vulnerability Let Attackers Inject Malicious SQL Commands
A critical SQL injection vulnerability, identified as CVE-2024–45387, has been discovered in Apache Traffic Control, a widely used…
Earn up to $30,000 by just thinking like a pro hacker while pentesting.: https://medium.com/@anandrishav2228/earn-up-to-30-000-by-just-thinking-like-a-pro-hacker-while-pentesting-da8e5984ccb9?source=rss------bug_bounty-5
Medium
Earn up to $30,000 by just thinking like a pro hacker while pentesting.
In the world of cybersecurity, the ability to think like a hacker is your greatest weapon. Ethical hacking, especially bug bounty hunting…
Find Secrets in Hidden Directories Using Fuzzing ️: https://medium.com/@kumawatabhijeet2002/find-secrets-in-hidden-directories-using-fuzzing-%EF%B8%8F-21a9a96c3246?source=rss------bug_bounty-5
Medium
Find Secrets in Hidden Directories Using Fuzzing 🕵️
In the world of cybersecurity, hidden directories are like treasure chests waiting to be uncovered. These directories often hold sensitive…
Interesting Technique to Enumerate Table Names in MySQL 8.x: https://j3x.medium.com/interesting-technique-to-enumerate-table-names-in-mysql-8-x-668857d43186?source=rss------bug_bounty-5
Medium
Interesting Technique to Enumerate Table Names in MySQL 8.x
As I was participating in a private bug bounty program, I found a Blind SQL injection in a LIMIT clause which was very tricky to exploit…
The WAF Gambit: How I Bypassed a Client’s Web Application Firewall and Exposed a Vulnerability: https://medium.com/@GHOSTWIELD/the-waf-gambit-how-i-bypassed-a-clients-web-application-firewall-and-exposed-a-vulnerability-d8f47452429a?source=rss------bug_bounty-5
Medium
The WAF Gambit: How I Bypassed a Client’s Web Application Firewall and Exposed a Vulnerability 💻💥
Hey fellow hackers! 👨💻👩💻 Grab your coffee because I’ve got a crazy story for you. It’s about how a simple payload I stumbled upon…
Mastering FFUF: The Ultimate Fuzzing Toolkit: https://medium.com/@kumawatabhijeet2002/mastering-ffuf-the-ultimate-fuzzing-toolkit-e16a85416c5c?source=rss------bug_bounty-5
Medium
Mastering FFUF: The Ultimate Fuzzing Toolkit 🚀
As a cybersecurity enthusiast and a bug hunter with a passion for uncovering hidden vulnerabilities, I’ve spent countless hours exploring…
Bug Chain: pre-auth takeover to permanent access.: https://gr3yg05t.medium.com/bug-chain-pre-auth-takeover-to-permanent-access-4d92829ed816?source=rss------bug_bounty-5
Medium
Bug Chain: pre-auth takeover to permanent access.
Grey here! In this blog, I’ll share how I escalated a normal pre-authentication account takeover into a permanent access backdoor. Let’s…
Exploiting Weak Password Change Mechanisms: Real-World Scenarios: https://medium.com/@alvinbijo_174/exploiting-weak-password-change-mechanisms-real-world-scenarios-84394158e9d8?source=rss------bug_bounty-5
Medium
Additional Visuals
1. Reusing Old Passwords
How I was able to delete MFA of any user without Authentication: https://medium.com/@sharp488/how-i-was-able-to-delete-mfa-of-any-user-without-authentication-814904b506a2?source=rss------bug_bounty-5
Medium
How I was able to delete MFA of any user without Authentication
Hello Folks,
Best Cyber Security tools You Must Know before 2024 ENDS: https://medium.com/meetcyber/best-cyber-security-tools-you-must-know-before-2024-ends-c207bd6ba0cd?source=rss------bug_bounty-5
Medium
Best Cyber Security tools You Must Know before 2024 ENDS
Discover the Top Tools to Fortify Your Defenses Against Evolving Digital Threats
Admin Hunter: Fast and Efficient Admin Panel Discovery: https://medium.com/@rootspaghetti/admin-hunter-fast-and-efficient-admin-panel-discovery-6461e818942c?source=rss------bug_bounty-5
Medium
Admin Hunter: Fast and Efficient Admin Panel Discovery
Admin Hunter: Discover Hidden Admin Panels with Speed and Precision
Mastering Gobuster: Unveiling Hidden Paths in Web Applications: https://medium.com/@kumawatabhijeet2002/mastering-gobuster-unveiling-hidden-paths-in-web-applications-2c7b6bb2fb1d?source=rss------bug_bounty-5
Medium
🚀 Mastering Gobuster: Unveiling Hidden Paths in Web Applications🔎
Web application security is a never-ending puzzle 🧩, where finding hidden directories, files, and subdomains can reveal critical…
❤1
OWASP Top 10 2025: What to Expect: https://infosecwriteups.com/owasp-top-10-2025-what-to-expect-22b8ede0c428?source=rss------bug_bounty-5
Medium
OWASP Top 10 2025: What to Expect
The OWASP Top 10 is set for its next update in early 2025. According to OWASP’s official page, the data collection process is currently…
OS_detection_using_ping_command_1633777120.pdf
315.5 KB
OS_detection_using_ping_command_1633777120.pdf