hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
GraphQL API Hacking!
Medium
GraphQL API Hacking!
Usually graphql endpoint are located at www.example.com/graphql.
hack and bug bounty
Attacking Service Accounts with Kerberoasting
Medium
Attacking Service Accounts with Kerberoasting
Today, we will discuss an old and well-known attack against Kerberos authentication during an Active Directory pentesting assessment called…
hack and bug bounty
Flutter Reverse Engineering and Security Analysis
Medium
Flutter Reverse Engineering and Security Analysis
Introduction
hack and bug bounty
Exploiting SQL Injection in Graphql | DVGA |
Medium
Exploiting SQL Injection in Graphql | DVGA |
This article covers exploiting SQL Injection manually in a Graphql Application.
hack and bug bounty
Finding Unauthorized API Access in Android Application
Medium
Finding Unauthorized API Access in Android Application
During my free time, i downloaded a android application from google play store for fun, i have actually known this application for a long…
hack and bug bounty
CrackMapexec | SMB & AD Enumeration Simplified !
Medium
CrackMapexec | SMB & AD Enumeration Simplified !
Have you ever found yourself staring at a Windows network, wondering how to find vulnerabilities and security holes? Don’t worry, CrackMapExec is here to save the day! It’s like having a Swiss Army…
hack and bug bounty
Exploit Development: What is STACK and how a STACK works.
Medium
Exploit Development: What is STACK and how a STACK works.
What is a stack?
hack and bug bounty
How I leveraged XSS to make Privilege Escalation to be Super Admin!
Medium
How I leveraged XSS to make Privilege Escalation to be Super Admin!
First of all, This was a private program, so I will refer to it with example.com.
Let me tell you how I found the Reflected XSS…
hack and bug bounty
Methods For Exploiting File Upload Vulnerabilities
Medium
Methods For Exploiting File Upload Vulnerabilities
This blog post was published on PurpleBox website on July 20th, 2022.
hack and bug bounty
ProFTPD Exploitation
Medium
ProFTPD Exploitation
ProFTPD (Professional File Transfer Protocol server Daemon) is an open-source software, used for FTP servers on Unix and Unix-like systems…
hack and bug bounty
Attacks on JSON Web Token (JWT)
Medium
Attacks on JSON Web Token (JWT)
In part1 of the article, I introduced JSON web tokens that what is JWT and How they are made? I prefer to take a look at that before you go…
hack and bug bounty
DNS Rebinding attack
Medium
DNS Rebinding attack
DNS Rebinding is a method of bypassing Same Origin Policy by manipulating DNS resolution
hack and bug bounty
Domain Takeover with PetitPotam Exploit
Medium
Domain Takeover with PetitPotam Exploit
domain escalation from a low-privileged user to a domain admin
hack and bug bounty
Using Metasploit to Attack Default SSH Username/Passwords
Medium
Using Metasploit to Attack Default SSH Username/Passwords
The Lab Environment
hack and bug bounty
Exploiting CSRF on JSON endpoints with Flash and redirects
Medium
Exploiting CSRF on JSON endpoints with Flash and redirects
(CSRF + Flash + HTTP 307) = Great for exploitation
hack and bug bounty
Application Security Software Market Overview, Share, Development and Forecast
Medium
Application Security Software Market Overview, Share, Development and Forecast
hack and bug bounty
Endpoint Allows for Multiple Account Creation
Medium
Endpoint Allows for Multiple Account Creation
Hello hackers,
hack and bug bounty
What are the 5 significant types of penetration testing?
Medium
What are the 5 significant types of penetration testing?
Introduction:
hack and bug bounty
Is Ethical Hacking In Demand?
Medium
Is Ethical Hacking In Demand?
hack and bug bounty
Users of X must now pay for TweetDeck.
Medium
Users of X must now pay for TweetDeck.
https://www.mysweet.id/2023/08/users-of-x-must-now-pay-for-tweetdeck.html
hack and bug bounty
SQLi - US Gov Datadump
Medium
SQLi - US Gov Datadump
Hi fellow hunters, in this write-up, I will explain how I founded SQL Injection Vulnerability and was able to dump data from the US…