hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
InfoSecSherpa’s News Roundup for Tuesday, August 22, 2023
Medium
InfoSecSherpa’s News Roundup for Tuesday, August 22, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Playing Admin With Signed Cookies — A Hands-on Example
Medium
Playing Admin With Signed Cookies — A Hands-on Example
An introduction to forging signed cookies using the Most Cookies ctf as an example
hack and bug bounty
VulnHub: Kioptrix Level 2
Medium
VulnHub: Kioptrix Level 2
Daha öncəki məqaləmdə Kioptrix Level 1-i üç müxtəlif üsul ilə həll etmişdik . Həmin məqalələrə aşağıdaı link vasitəsi ilə daxil ola…
hack and bug bounty
You could become an ethical hacker in 1 month.
Medium
You could become an ethical hacker in 1 month.
These are the 5 simple steps you need to take.
hack and bug bounty
OverTheWire-Bandit(Part-2)(WriteUp)
Medium
OverTheWire-Bandit(Part-2)(WriteUp)
Hey Everyone! Welcome back. Last time within part-1, I finished off upto Level 11–>12. So, for the introduction and basic information refer…
hack and bug bounty
How to expand your attack surface and avoid duplicates
Medium
How to expand your attack surface and avoid duplicates
we’re gonna talk in this blog about JS files, how to get easy wins from it
hack and bug bounty
The Power of Guest: Account Takeover
Medium
The Power of Guest: Account Takeover
Hello All, this a write up about an account takeover using guest access (which is kinda dumb)
hack and bug bounty
Journey to Cyber Security Professional
Medium
Journey to Cyber Security Professional
Documenting my journey to becoming a cybersecurity professional. Join me!
hack and bug bounty
Hacking For 20 Hours in a Private Bug Bounty Program
Medium
Hacking For 20 Hours in a Private Bug Bounty Program
I decided to hack on private program for 20 hours, In this story, I’ll share my experiences about my journey.
hack and bug bounty
My 1st DefCon: DefCon 31 Review
Medium
My 1st DefCon: DefCon 31 Review
Hello everyone! I went to my first-ever DefCon this year in Las Vegas (DefCon 31), and I wanted to share my experiences, both good and bad…
hack and bug bounty
Unveiling Cross-Site Scripting Vulnerabilities in Paddy Power’s Website:
Medium
Unveiling Cross-Site Scripting Vulnerabilities in Paddy Power’s Website:
The story of @helloitisme
hack and bug bounty
pSQL optimisation in AppSec Apps
Medium
pSQL optimisation in AppSec Apps
PostgreSQL is a powerful, open-source object-relational database system. It is highly extensible and enables high performance, security…
hack and bug bounty
Bug Zero at a Glance [Week 07–20 August](
https://blog.bugzero.io/bug-zero-at-a-glance-week-07-20-august-fbfcb307ca73?source=rss------bugbounty-5
)
Medium
Bug Zero at a Glance [Week 07–20 August]
What happened with Bug Zero?
hack and bug bounty
Unveiling the ScaRCE Framework: CVE-2021–41773 Hunter
Medium
Unveiling the ScaRCE Framework: CVE-2021–41773 Hunter
Welcome to our YouTube video on the ScaRCE Framework — CVE-2021–41773 Hunter. In this exciting presentation, we will be unveiling the…
hack and bug bounty
Exploring SS7 Vulnerabilities: A Practical Walk Through by Pentester Club Pvt Ltd.
Medium
Exploring SS7 Vulnerabilities: A Practical Walk Through by Pentester Club Pvt Ltd.
Welcome to Pentester Club Pvt Ltd’s practical walk through on exploring SS7 vulnerabilities. In this comprehensive video tutorial, our team…
hack and bug bounty
Crack the Code: Your Ultimate Guide to Blind XSS Injection with bxss
Medium
Crack the Code: Your Ultimate Guide to Blind XSS Injection with bxss
Welcome to our YouTube video on “Unmasking bxss: Your Ultimate Guide to Blind XSS Injection.” In this tutorial, we will delve into the…
hack and bug bounty
Nikto Introduction — Web Application Security
Medium
Nikto Introduction — Web Application Security
Nikto is a vulnerability scanner part of Kali Linux and is widely used to find vulnerabilities in Web servers. It performs various tasks, including: All information, techniques, and tools described…
hack and bug bounty
Secure Code Review (SCR) : A7 — Missing Function Level Access Control
Medium
Secure Code Review (SCR): A7 — Missing Function Level Access Control
In the vast landscape of web application vulnerabilities, Missing Function Level Access Control stands out as a significant concern. It…
hack and bug bounty
Continuous Improvement: Adapting Application Security Architecture to Emerging Threats
Medium
Continuous Improvement: Adapting Application Security Architecture to Emerging Threats
In today’s rapidly evolving digital landscape, the role of application security has never been more crucial. With the constant emergence of…
hack and bug bounty
Windows — Sessions
Medium
Windows — Sessions
Every process started on a system belongs to a specific user maintained by an access token…
hack and bug bounty
Ethical Hacking Learning Path — A Complete Roadmap
Medium
Ethical Hacking Learning Path — A Complete Roadmap
1. Fundamentals: