hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Advanced Testing Techniques of Web Application
Medium
Advanced Testing Techniques of Web Application
Advanced testing techniques for web applications aim to uncover more comprehensive and critical defects, ensuring the application’s functionality, security, and performance are thoroughly validated…
hack and bug bounty
Top 5 current vulnerable programming languages
Medium
Top 5 current vulnerable programming languages
Currently the top 5 most vulnerable programming languages from an application security perspective are C, PHP, Java, JavaScript, and…
hack and bug bounty
Joshua Brzuchalski — Specialist in Application Security
Medium
Joshua Brzuchalski — Specialist in Application Security
Joshua Brzuchalski is an expert in Cyber Resiliency and security solutions, helping clients to have fewer security incidents and less risk…
hack and bug bounty
Mimikatz: Beginner’s Guide
Medium
Mimikatz: Beginner’s Guide
Mimikatz is an open source application that allows users to view and store authentication credentials such as Kerberos tickets. Its toolset…
hack and bug bounty
Guide to MiTM Attacks with Ettercap
Medium
Guide to MiTM Attacks with Ettercap
Man-in-the-Middle attacks can be among the most prolific and malicious attacks. If the attacker can position himself between two systems…
hack and bug bounty
Android security: Everything you need to know
Medium
Android security: Everything you need to know
Although mobile users are slowly seeing their choice of operating systems expand, Android and iOS still hold the lion’s share of the market…
hack and bug bounty
DNS Hacking: Local network redirect to our page
Medium
DNS Hacking: Local network redirect to our page
In this guide, we will take advantage of Domain Name Service (DNS). As you know, DNS is used to resolve domain names or convert a domain…
hack and bug bounty
Compromise mobile communications via Unisoc vulnerability
Medium
Compromise mobile communications via Unisoc vulnerability
Chinese company UNISOC, founded as Spreadtrum, is one of the largest chipmakers in the world and the largest in China for the past 20…
hack and bug bounty
Getting a Pentesting Job Without Spending a Dollar
Medium
Getting a Pentesting Job Without Spending a Dollar
In light of recent debates and scandals about cybersecurity education and job search, I want to provide my own views and insights
hack and bug bounty
Top Security Practices in Our Software Development Process
Medium
Top Security Practices in Our Software Development Process
In an increasingly digitised world, securing your software applications is not merely an option — it’s a necessity. With cyber threats…
hack and bug bounty
Install Kali Linux di Mac M1/M2 via UTM
Medium
Install Kali Linux di Mac M1/M2 via UTM
Jika Anda adalah pengguna Mac M1 yang ingin menjalankan sistem operasi Kali Linux dalam lingkungan virtual, UTM (Universal Task Manager)…
hack and bug bounty
The Fine Line: Navigating the Ethics of Cybersecurity in an Era of Privacy vs. Security
Medium
The Fine Line: Navigating the Ethics of Cybersecurity in an Era of Privacy vs. Security
Cybersecurity is a critical issue in today’s world, as organizations and individuals face increasingly sophisticated and persistent cyber…
hack and bug bounty
HTTP Session and Session Hijacking
Medium
HTTP Session and Session Hijacking
First, Let’s discuss about HTTP sessions
hack and bug bounty
Encrypting Communications in Malware: A Dive into Windows API Functions with Python
Medium
Encrypting Communications in Malware: A Dive into Windows API Functions with Python
This article uses Python and ctypes to illustrate the Windows API functions, but in real-world scenarios, malware is often written in…
hack and bug bounty
How to Secure the Expanding Attack Surface with Application Security Testing (AST)
Medium
How to Secure the Expanding Attack Surface with Application Security Testing (AST)
Cloud, IoT Devices, APIs, Web Apps, BYOD, Remote Work, Supply Chain, and Third Party Vendors
hack and bug bounty
Redacted usernames disclosure in "Export as .pdf" feature
Medium
Redacted usernames disclosure in "Export as .pdf" feature
Severity: Low (3.4)
Weakness: Sensitive Information Disclosure
Bounty: $500
hack and bug bounty
How to exploit SQL Injection to RCE using SQLMAP
Medium
How to exploit SQL Injection to RCE using SQLMAP
It was first time in my cyber security career, I have discovered this critical vulnerability back in 2019, I thought of posting it in…
hack and bug bounty
Design Flaws in Authentication in Web Applications Pentesting — 15 | 2023
Medium
Design Flaws in Authentication in Web Applications Pentesting — 15 | 2023
Understanding Vulnerabilities and Best Practices to Strengthen Web Application Authentication | Karthikeyan Nagaraj
hack and bug bounty
Cyber Briefing: 2023.08.07
Medium
Cyber Briefing: 2023.08.07
👉
What’s happening in cybersecurity today? hVNC Malware, MacOS, Apple, Reptile Rootkit, South Korea, Microsoft Power Platform, Team R70…
hack and bug bounty
X: The Twitter Rebrand (Xplained)
Medium
X: The Twitter Rebrand (Xplained)
On July 24, 2023, Monday, Twitter killed the Blue Bird to officially become X, with a new logo inspired by Unicode. Elon Musk fans say this…
hack and bug bounty
Cyber Security Audits: Everything You Need to Know
Medium
Cyber Security Audits: Everything You Need to Know
Regular, comprehensive cyber security audits are critical for managing escalating risks in today’s digital landscape. This in-depth guide…