hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Exploit Development: What is STACK and how a STACK works.
Medium
Exploit Development: What is STACK and how a STACK works.
What is a stack?
hack and bug bounty
How I leveraged XSS to make Privilege Escalation to be Super Admin!
Medium
How I leveraged XSS to make Privilege Escalation to be Super Admin!
First of all, This was a private program, so I will refer to it with example.com.
Let me tell you how I found the Reflected XSS…
hack and bug bounty
Methods For Exploiting File Upload Vulnerabilities
Medium
Methods For Exploiting File Upload Vulnerabilities
This blog post was published on PurpleBox website on July 20th, 2022.
hack and bug bounty
ProFTPD Exploitation
Medium
ProFTPD Exploitation
ProFTPD (Professional File Transfer Protocol server Daemon) is an open-source software, used for FTP servers on Unix and Unix-like systems…
hack and bug bounty
Attacks on JSON Web Token (JWT)
Medium
Attacks on JSON Web Token (JWT)
In part1 of the article, I introduced JSON web tokens that what is JWT and How they are made? I prefer to take a look at that before you go…
hack and bug bounty
DNS Rebinding attack
Medium
DNS Rebinding attack
DNS Rebinding is a method of bypassing Same Origin Policy by manipulating DNS resolution
hack and bug bounty
Domain Takeover with PetitPotam Exploit
Medium
Domain Takeover with PetitPotam Exploit
domain escalation from a low-privileged user to a domain admin
hack and bug bounty
Using Metasploit to Attack Default SSH Username/Passwords
Medium
Using Metasploit to Attack Default SSH Username/Passwords
The Lab Environment
hack and bug bounty
Exploiting CSRF on JSON endpoints with Flash and redirects
Medium
Exploiting CSRF on JSON endpoints with Flash and redirects
(CSRF + Flash + HTTP 307) = Great for exploitation
hack and bug bounty
Application Security Software Market Overview, Share, Development and Forecast
Medium
Application Security Software Market Overview, Share, Development and Forecast
hack and bug bounty
Endpoint Allows for Multiple Account Creation
Medium
Endpoint Allows for Multiple Account Creation
Hello hackers,
hack and bug bounty
What are the 5 significant types of penetration testing?
Medium
What are the 5 significant types of penetration testing?
Introduction:
hack and bug bounty
Is Ethical Hacking In Demand?
Medium
Is Ethical Hacking In Demand?
hack and bug bounty
Users of X must now pay for TweetDeck.
Medium
Users of X must now pay for TweetDeck.
https://www.mysweet.id/2023/08/users-of-x-must-now-pay-for-tweetdeck.html
hack and bug bounty
SQLi - US Gov Datadump
Medium
SQLi - US Gov Datadump
Hi fellow hunters, in this write-up, I will explain how I founded SQL Injection Vulnerability and was able to dump data from the US…
hack and bug bounty
Agent Sudo — TryhackMe WriteUp
Medium
Agent Sudo — TryhackMe WriteUp
Hello readers, let’s dive into the depths of cyber intrigue with ‘Agent Sudo,’ a captivating easy rated room on TryHackMe. Imagine yourself…
hack and bug bounty
Windows Security — Primary Access Token
Medium
Windows Security — Primary Access Token
Overall, there are two types of access tokens (https://medium.com/@boutnaru/windows-security-access-token-81cd00000c64) — as stated in the…
hack and bug bounty
मस्क और जुकरबर्ग का रद्द हुआ केज मैच मर्दाना चिंता के बारे में क्या कहता है
Medium
मस्क और जुकरबर्ग का रद्द हुआ केज मैच मर्दाना चिंता के बारे में क्या कहता है
जबकि पिंजरे के बीच लड़ाई होती है मेटा सीईओ मार्क जुकरबर्ग और टेस्ला सीईओ एलोन मस्क ऐसा लगता है कि यह रुका हुआ है, अगर ये लोग कभी झगड़ा करना बंद कर देते हैं, तो यह “टेक भाई” शब्द को एक नया अर्थ देगा।…
hack and bug bounty
CompTIA PenTest+ Exam: A Comprehensive Overview
Medium
CompTIA PenTest+ Exam: A Comprehensive Overview
For experts looking to prove their expertise in penetration testing and ethical hacking, the CompTIA PenTest+ exam is a widely recognised…
hack and bug bounty
Navigating a Code-Based Vulnerability ️♂️: HTML Injection
Medium
Navigating a Code-Based Vulnerability
🕵️♂️
: HTML Injection
In cybersecurity, threats to online applications are in a constant state of evolution. Among these digital predators, HTML Injection…
hack and bug bounty
T-Pot Installation and Use
Medium
T-Pot Installation and Use
The T-Pot Honeypot framework is a multi-use Honeypot framework that deploys custom Docker containers to a set of protocols that emulate…