hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Methods For Exploiting File Upload Vulnerabilities
Medium
Methods For Exploiting File Upload Vulnerabilities
This blog post was published on PurpleBox website on July 20th, 2022.
hack and bug bounty
ProFTPD Exploitation
Medium
ProFTPD Exploitation
ProFTPD (Professional File Transfer Protocol server Daemon) is an open-source software, used for FTP servers on Unix and Unix-like systems…
hack and bug bounty
Attacks on JSON Web Token (JWT)
Medium
Attacks on JSON Web Token (JWT)
In part1 of the article, I introduced JSON web tokens that what is JWT and How they are made? I prefer to take a look at that before you go…
hack and bug bounty
DNS Rebinding attack
Medium
DNS Rebinding attack
DNS Rebinding is a method of bypassing Same Origin Policy by manipulating DNS resolution
hack and bug bounty
Domain Takeover with PetitPotam Exploit
Medium
Domain Takeover with PetitPotam Exploit
domain escalation from a low-privileged user to a domain admin
hack and bug bounty
Using Metasploit to Attack Default SSH Username/Passwords
Medium
Using Metasploit to Attack Default SSH Username/Passwords
The Lab Environment
hack and bug bounty
Exploiting CSRF on JSON endpoints with Flash and redirects
Medium
Exploiting CSRF on JSON endpoints with Flash and redirects
(CSRF + Flash + HTTP 307) = Great for exploitation
hack and bug bounty
Application Security Software Market Overview, Share, Development and Forecast
Medium
Application Security Software Market Overview, Share, Development and Forecast
hack and bug bounty
Endpoint Allows for Multiple Account Creation
Medium
Endpoint Allows for Multiple Account Creation
Hello hackers,
hack and bug bounty
What are the 5 significant types of penetration testing?
Medium
What are the 5 significant types of penetration testing?
Introduction:
hack and bug bounty
Is Ethical Hacking In Demand?
Medium
Is Ethical Hacking In Demand?
hack and bug bounty
Users of X must now pay for TweetDeck.
Medium
Users of X must now pay for TweetDeck.
https://www.mysweet.id/2023/08/users-of-x-must-now-pay-for-tweetdeck.html
hack and bug bounty
SQLi - US Gov Datadump
Medium
SQLi - US Gov Datadump
Hi fellow hunters, in this write-up, I will explain how I founded SQL Injection Vulnerability and was able to dump data from the US…
hack and bug bounty
Agent Sudo — TryhackMe WriteUp
Medium
Agent Sudo — TryhackMe WriteUp
Hello readers, let’s dive into the depths of cyber intrigue with ‘Agent Sudo,’ a captivating easy rated room on TryHackMe. Imagine yourself…
hack and bug bounty
Windows Security — Primary Access Token
Medium
Windows Security — Primary Access Token
Overall, there are two types of access tokens (https://medium.com/@boutnaru/windows-security-access-token-81cd00000c64) — as stated in the…
hack and bug bounty
मस्क और जुकरबर्ग का रद्द हुआ केज मैच मर्दाना चिंता के बारे में क्या कहता है
Medium
मस्क और जुकरबर्ग का रद्द हुआ केज मैच मर्दाना चिंता के बारे में क्या कहता है
जबकि पिंजरे के बीच लड़ाई होती है मेटा सीईओ मार्क जुकरबर्ग और टेस्ला सीईओ एलोन मस्क ऐसा लगता है कि यह रुका हुआ है, अगर ये लोग कभी झगड़ा करना बंद कर देते हैं, तो यह “टेक भाई” शब्द को एक नया अर्थ देगा।…
hack and bug bounty
CompTIA PenTest+ Exam: A Comprehensive Overview
Medium
CompTIA PenTest+ Exam: A Comprehensive Overview
For experts looking to prove their expertise in penetration testing and ethical hacking, the CompTIA PenTest+ exam is a widely recognised…
hack and bug bounty
Navigating a Code-Based Vulnerability ️♂️: HTML Injection
Medium
Navigating a Code-Based Vulnerability
🕵️♂️
: HTML Injection
In cybersecurity, threats to online applications are in a constant state of evolution. Among these digital predators, HTML Injection…
hack and bug bounty
T-Pot Installation and Use
Medium
T-Pot Installation and Use
The T-Pot Honeypot framework is a multi-use Honeypot framework that deploys custom Docker containers to a set of protocols that emulate…
hack and bug bounty
Hacking for Good: How Ethical Hackers Keep the Cyberworld Safe(Part-03)
Medium
Hacking for Good: How Ethical Hackers Keep the Cyberworld Safe(Part-03)
In the exploitation stage of a penetration test, vulnerabilities in the target systems, networks, or applications are attempted…
hack and bug bounty
X Pro, Formerly TweetDeck, Rebrands and Becomes a Paid Blue Premium Service
Medium
X Pro, Formerly TweetDeck, Rebrands and Becomes a Paid Blue Premium Service
Key takeaways