hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
THM — Epoch | 52/100
Medium
THM — Epoch | 52/100
Hi! Here is a writeup of Epoch from TryHackMe. This was a very beginner box that featured a command injection vulnerability which we were…
hack and bug bounty
Build no infrastructure, then we’ll talk
Medium
Build no infrastructure, then we’ll talk
We’re in this strange ol’ time where it feels like so many aspects of our lives are maintained by ubiquitous, real-time connectivity to the…
hack and bug bounty
Quick Guide for cyber security Pen Testing that can help :)
Medium
Quick Guide for cyber security Pen Testing that can help :)
If you are new and you want to learn everything from scratch this tutorial help you to understand thing Cyber Security and with basic…
hack and bug bounty
Performance testing of AppSec tools
Medium
Performance testing of AppSec tools
Performance testing of Application Security tools prior to production release is valuable because it helps to ensure that the tools are…
hack and bug bounty
InfoSecSherpa’s News Roundup for Monday, August 14, 2023
Medium
InfoSecSherpa’s News Roundup for Monday, August 14, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Navigating Ethical Hacking: Your Path to Becoming a Cybersecurity Professional
Medium
Navigating Ethical Hacking: Your Path to Becoming a Cybersecurity Professional
The field of ethical hacking offers an engaging introduction to cybersecurity, where people defend digital environments by comprehending…
hack and bug bounty
DNS Spoofing Attack Using Python
Medium
DNS Spoofing Attack Using Python
In this article, I will demonstrate how you can execute a DNS Spoofing Attack using the Python Language. First, we will implement an ARP…
hack and bug bounty
Windows — Securable Objects
Medium
Windows — Securable Objects
Overall, “securable objects” are Windows objects (https://medium.com/@boutnaru/windows-objects-2c289da600bf) that can have a “security…
hack and bug bounty
Unveiling Vulnerabilities: Host-header injection in OAuth Functionality
Medium
Unveiling Vulnerabilities: Host-header injection in OAuth Functionality
Introduction
hack and bug bounty
Critical XSS Vulnerability in Workflowy
Medium
Critical XSS Vulnerability in Workflowy
Exposes Users to Unauthorized Code Execution and Information Disclosure: Immediate Caution Advised
hack and bug bounty
Exploiting URL-Based Access Control: A Lab Analysis
Medium
Exploiting URL-Based Access Control: A Lab Analysis
Introduction: Greetings, infosec researchers!
hack and bug bounty
A Journey Close to RCE in Nokia
Medium
A Journey Close to RCE in Nokia
Hello everyone. In this article, I will share the story of how I came very close to discovering an RCE (Remote Code Execution)…
hack and bug bounty
Top 10 Subdomain Finders for Great Website Reconnaissance in Bug Bounty
Medium
Top 10 Subdomain Finders for Great Website Reconnaissance in Bug Bounty
Subdomain enumeration is the process of finding #subdomains of a particular domain. Subdomain Finder is a useful tool to help discover…
hack and bug bounty
Zuckerberg Dismisses Musk’s Cage Fight Proposal as a Mere Spectacle
Medium
Zuckerberg Dismisses Musk’s Cage Fight Proposal as a Mere Spectacle
Mark Zuckerberg has publicly stated that Elon Musk’s proposal for a cage fight is not a serious endeavor and suggests it’s time to move on…
hack and bug bounty
This is Leonidas, he is deploying an application online and needs to be sure that application…
Medium
This is Leonidas, he is deploying an application online and needs to be sure that application…
He does not look like an application administrator. Don’t judge!
hack and bug bounty
Benefits of PCI DSS Compliance
Medium
Benefits of PCI DSS Compliance
Every organization that handles credit card information, whether they store, process, or transmit it, is required to comply with the PCI…
hack and bug bounty
X (Formerly Twitter) To Roll Out Video And Audio Calling Features.
Medium
X (Formerly Twitter) To Roll Out Video And Audio Calling Features.
In its ongoing evolution into X, Twitter’s CEO, Linda Yaccarino, has confirmed that a forthcoming feature will allow platform users to…
hack and bug bounty
Cyber Briefing: 2023.08.15
Medium
Cyber Briefing: 2023.08.15
👉
What’s the latest in the cyber world today? QwixxRAT, RAT, Telegram, Discord, Linux, Monti Ransomware, Cryptocurrency Scams, FBI…
hack and bug bounty
Exploring Authentication Mechanisms and Their Role in API Security
Medium
Exploring Authentication Mechanisms and Their Role in API Security
In the rapidly evolving landscape of modern software development, securing data and resources has become paramount. Authentication…
hack and bug bounty
VEnum — Subdomain Enumeration Tool
Medium
VEnum — Subdomain Enumeration Tool
The first step in any Pentesting engagement or Bug Hunting is to mapping and enumerate all target’s assets specially if you will go…
hack and bug bounty
How to Find and Exploit Remote Code Execution (RCE) Vulnerabilities: Unveiling the Pathways to…
Medium
How to Find and Exploit Remote Code Execution (RCE) Vulnerabilities: Unveiling the Pathways to Digital Security | 2023
Unlocking the Secrets of Remote Code Execution (RCE) Vulnerabilities: A Definitive Guide | Karthikeyan Nagaraj