HTTP version 1.X sends requests as clear-text, and uses a new-line character to separate different fields and different requests. HTTP version 2.X, on the other hand, sends requests as binary data in a dictionary form. I am sharing this because you can actually add this in your next pentest report
๐2
Hack_The_Box_All_Pack_NewBie_E-Learning_2024.zip
1.7 GB
Cybersecurity Courses 2024 by Hack The Box
โค7๐ฅ3๐1
Penetration Testing.pdf
12.2 MB
๐ Penetration Testing (1st)๐ June 14, (2014)โ๏ธ Author: Georgia Weidman๐ Pages: (528)
Please open Telegram to view this post
VIEW IN TELEGRAM
๐2
At the time of publication, none of the scripts were flagged by antivirus systems. However, typically within 2-3 weeks after publication, some vendors begin to detect and flag the malicious files.
Please open Telegram to view this post
VIEW IN TELEGRAM
Automating Authenticated scans in burp suite for 2FA applications
https://freedium.cfd/https://medium.com/@thelazypentester/automating-authenticated-scans-in-burp-suite-for-2fa-applications-ae93882e26c9
https://freedium.cfd/https://medium.com/@thelazypentester/automating-authenticated-scans-in-burp-suite-for-2fa-applications-ae93882e26c9
freedium.cfd
Automating Authenticated scans in burp suite for 2FA applications | by Jobson - Freedium
Salutations, humans, and bots
Mastering Wfuzz: Uncover Hidden Web Vulnerabilitiese: https://medium.com/@kumawatabhijeet2002/mastering-wfuzz-uncover-hidden-web-vulnerabilitiese-351cbbef18d6?source=rss------bug_bounty-5
Medium
๐ Mastering Wfuzz: Uncover Hidden Web Vulnerabilities๐
In the world of cybersecurity, fuzzing is like unlocking hidden doors ๐ in a web application. Itโs a technique where we inject unexpectedโฆ
๐1
This is a writeup of how can I get critical $$$$ bounty from PII Disclosure - Broken Access: https://medium.com/@0xNayelx/this-is-a-writeup-of-how-can-i-get-critical-bounty-from-pii-disclosure-broken-access-7a113e5dc50c?source=rss------bug_bounty-5
Medium
This is a writeup of how can I get critical $$$$ bounty from PII Disclosure - Broken Access
ุจุณู
ุงููู โค๏ธ, ุงูููู
ุนูููู
ูุง ู
ุง ูููุนูุงุ ูุงููุนูุง ุจู
ุง ุนูููู
ุชููุงุ ูุฒุฏูุง ุนูู
ุงู
๐1
Unleashing My Recon Weapon: A Custom Bash Tool for Bug Bounty: https://medium.com/@kumawatabhijeet2002/unleashing-my-recon-weapon-a-custom-bash-tool-for-bug-bounty-d946b5f26dd9?source=rss------bug_bounty-5
Medium
Unleashing My Recon Weapon: A Custom Bash Tool for Bug Bounty๐ฅ
Hello, everyone! ๐
๐1
Session Hijacking Vulnerability in Password Reset Flow Leading to Cross-Account Access: https://medium.com/@iPsalmy/session-hijacking-vulnerability-in-password-reset-flow-leading-to-cross-account-access-4823d88e680a?source=rss------bug_bounty-5
Medium
Session Hijacking Vulnerability in Password Reset Flow Leading to Cross-Account Access
How a Flawed Session and OTP Validation Enabled Cross-Account Password Resets
Old School Out-of-Band (OOB) SQL Injection Manual Approach: https://anontuttuvenus.medium.com/old-school-out-of-band-oob-sql-injection-manual-approach-cc50b81c5984?source=rss------bug_bounty-5
Medium
Old School Out-of-Band (OOB) SQL Injection Manual Approach
I recently discovered an Out-of-Band (OOB) SQL injection in a private program. I was able to crack it easily with basic payload hence Iโฆ