hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Introducing Goctopus: Open-Source GraphQL endpoint discovery tool written in go
Medium
Introducing Goctopus: Open-Source GraphQL endpoint discovery tool written in go
In the fast-evolving domain of APIs, GraphQL has emerged as a powerful, data-oriented language. As its adoption soars, so does the need for…
hack and bug bounty
Securing the University by failure of invalidating of session
Medium
Securing the University by failure of invalidating of session
Tale of securing the university of united states.
hack and bug bounty
Bug Bounty Course For Begineers
Medium
Bug Bounty Course For Begineers
Are you ready to step into the exciting world of ethical hacking and web security? Look no further! Join our globally renowned…
hack and bug bounty
Site Takeover via SCCM’s AdminService API
Medium
Site Takeover via SCCM’s AdminService API
tl:dr: The SCCM AdminService API is vulnerable to NTLM relaying and can be abused for SCCM site takeover.
hack and bug bounty
Join GuidedHacking Today
Medium
Join GuidedHacking Today
Learning Penetration Testing
hack and bug bounty
Exploring Burp Suite’s Features: A Detailed Overview
Medium
Exploring Burp Suite’s Features: A Detailed Overview
In the field of web application security testing, Burp Suite has established itself as a powerful and widely-used tool. Whether you are a…
hack and bug bounty
CSRF in OAuth flow of a private program.
Medium
CSRF in OAuth flow of a private program.
Hello friend, This writeup is about a simple CSRF in a function that’s using OAuth to attach third-party accounts to the user’s dashboard.
hack and bug bounty
Account takeover of any user through password reset functionality.
Medium
Account takeover of any user through password reset functionality.
Hello Everyone,
hack and bug bounty
EC-Council CEH Practical / Master 準備心得-讓理論與實作相輔相成的學習
Medium
EC-Council CEH Practical / Master 準備心得 — 讓理論與實作相輔相成的學習
CEH Practical 是需要在 6 小時內完成 20 題實作考試的入門級實戰證照,很適合資安管理人員了解一些攻擊原理,畢竟管理人也絕對是需要懂防守與攻擊技術概念。早期的 CEH 考試沒有實作,而現在 CEH Practical…
hack and bug bounty
Mastering the Basics: Bandit Wargame Level 0 Walkthrough
Medium
Mastering the Basics: Bandit Wargame Level 0 Walkthrough
Introduction:
hack and bug bounty
Aleo FireSide Newspaper #24 (English)
Medium
Aleo FireSide Newspaper #24 (English)
The publication was prepared by: Gena | GG, rykovka, RoyHansen, AnnaB, Rufat, Sula and the_liolik
hack and bug bounty
Aleo FireSide Newspaper #24 (Ukrainian)
Medium
Aleo FireSide Newspaper #24 (Ukrainian)
Випуск підготували: Gena | GG, rykovka, RoyHansen, AnnaB, Rufat Sula і the_liolik
hack and bug bounty
Windows Security — User Interface Privilege Isolation (UIPI)
Medium
Windows Security — User Interface Privilege Isolation (UIPI)
User Interface Privilege Isolation (UIPI) was introduced in Windows 2008/Vista with the goal of mitigating “Shatter Attacks”. Those types…
hack and bug bounty
Tenable CTF 2023
Medium
Tenable CTF 2023
Hello Hackers this my first and not last write up i want to share my solutions.
And for those not familiar with Capture The Flag (CTF)…
hack and bug bounty
Exploiting File Upload In DVWA Using The Tool Dvwaupsploit
Medium
Exploiting File Upload In DVWA Using The Tool Dvwaupsploit
Recently, we developed a tool used to exploit file upload vulnerabilities. What tool is it? The tool is called “dvwaupsploit,” short form…
hack and bug bounty
Revealing a Security Flaw: How I Discovered a Data Leak.
Medium
Revealing a Security Flaw: How I Discovered a Data Leak.
TLDR; Discovered a programming bug exposing sensitive data on a financial platform, reported it and received an appreciation letter from…
hack and bug bounty
ISO/IEC 27701, preview
Medium
ISO/IEC 27701, preview
ISO27701은 개인정보 보호를 위한 ISO27001 및 ISO27002의 확장판으로, 조직이 개인정보보호를 위해 갖추어야하는 요구사항과 가이드라인을 동시에 제공한다.
hack and bug bounty
Zed Attack Proxy Nedir
Medium
Zed Attack Proxy Nedir
ZAP, istemci ile server arasına girerek web uygulamasının güvenlik testlerini yapmaya yarayan bir araçtır.
hack and bug bounty
A Quick Touch of Application Analysis with Snyk
Medium
A Quick Touch of Application Analysis with Snyk
Finding and fixing vulnerabilities from the first lines of code to the running cloud is quite critical for an enterprise.
hack and bug bounty
Single Sign-On (SSO): Potential flaws or vulnerabilities in the implementation
Medium
Single Sign-On (SSO): Potential flaws or vulnerabilities in the implementation
As an application security engineer, your responsibility is to identify and address potential flaws or vulnerabilities in the Single…
hack and bug bounty
Red Team Member — How to ensure persistence in a system.
Medium
Red Team Member — How to ensure persistence in a system.
Hello folks, today we’re going to talk about something interesting. Let’s talk about the subject in conversation at first and then move on…