Adding a malicious notebook to be treated like a trusted notebook in Google Colab — 1337$
https://medium.com/@raushanraj_65039/adding-a-malicious-notebook-to-be-treated-like-a-trusted-notebook-in-google-colab-1337-b84353a9f77
https://medium.com/@raushanraj_65039/adding-a-malicious-notebook-to-be-treated-like-a-trusted-notebook-in-google-colab-1337-b84353a9f77
Medium
Adding a malicious notebook to be treated like a trusted notebook in Google Colab — 1337$
Introduction
Unauthorized Google Maps API Key Usage Cases, and Why You Need to Care https://medium.com/@ozguralp/unauthorized-google-maps-api-key-usage-cases-and-why-you-need-to-care-1ccb28bf21e
Medium
Unauthorized Google Maps API Key Usage Cases, and Why You Need to Care
For the ones who do not have any information about this service and its API Key’s, Google Maps API is a paid service which allows…
Simple Remote Code Execution Vulnerability Examples for Beginners
https://medium.com/@ozguralp/simple-remote-code-execution-vulnerability-examples-for-beginners-985867878311
https://medium.com/@ozguralp/simple-remote-code-execution-vulnerability-examples-for-beginners-985867878311
Medium
Simple Remote Code Execution Vulnerability Examples for Beginners
Especially when I talk with newbie security researchers/bug bounty hunters, they always make me feel as not thinking theirselves capable…
How to Use OWASP Amass: An Extensive Tutorial https://www.dionach.com/blog/how-to-use-owasp-amass-an-extensive-tutorial/
Multiple Host Header Attacks after bypassing protection with… a Header Attack https://0x00sec.org/t/multiple-host-header-attacks-after-bypassing-protection-with-a-header-attack/18018
0x00sec - The Home of the Hacker
Multiple Host Header Attacks after bypassing protection with... a Header Attack
I was searching for bug bounty programmes by using google dorks, when I came across one by a company, let’s say, Example Inc. They had a ,relatively, big scope and I thought I’d give that a try. After doing some recon and finding some interesting domains…
VLC 4.0.0 - Stack Buffer Overflow (SEH)
https://hackerone.com/reports/489102
https://hackerone.com/reports/489102
HackerOne
VLC (European Commission - DIGIT) disclosed on HackerOne: VLC 4.0.0...
**Summary:**
Incorrect calculation of Buffer Size in rist module for VLC leading to Stack Overflow with SEH chain overwrite.
The modules/access/rist module has an incorrect calculation of buffer...
Incorrect calculation of Buffer Size in rist module for VLC leading to Stack Overflow with SEH chain overwrite.
The modules/access/rist module has an incorrect calculation of buffer...
On Full-Time Bug Bounty Hunting
https://ajxchapman.github.io/bugbounty/2020/02/10/on-full-time-bug-bounty-hunting.html
https://ajxchapman.github.io/bugbounty/2020/02/10/on-full-time-bug-bounty-hunting.html
How I Made $600 in Bug Bounty in 15 Minutes with Contrast CE
https://securityboulevard.com/2020/02/how-i-made-600-in-bug-bounty-in-15-minutes-with-contrast-ce-cve-2019-8442/
https://securityboulevard.com/2020/02/how-i-made-600-in-bug-bounty-in-15-minutes-with-contrast-ce-cve-2019-8442/
Security Boulevard
How I Made $600 in Bug Bounty in 15 Minutes with Contrast CE – CVE- 2019-8442
We live in a dynamic economy that is constantly developing new ways to generate revenue. An area that fascinates me are the bug bounty programs such as Atlassian on BugCrowd. Generating tangible rewards from these programs is not an easy undertaking. After…
Facebook's BountyCon 2020 CTF Writeup https://blog.shoebpatel.com/2020/01/31/Facebooks-BountyCon-2020-CTF-Writeup/
CaptainFreak
Facebook's BountyCon 2020 CTF Writeup
BountyCon2020BountyCon is an invitation-only application security conference arranged by Facebook annually in Singapore for the BugBounty Community of Asia-Pacific region. For more information about i