hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Implications of removing Administrator accounts from AppSec applications
Medium
Implications of removing Administrator accounts from AppSec applications
Administrator accounts in application security applications play a crucial role in managing and securing the application environment. They…
hack and bug bounty
Understanding Lapsus$ Group’s SIM-Swapping Attacks
Medium
Understanding Lapsus$ Group’s SIM-Swapping Attacks
In a striking revelation, the U.S. government has meticulously dissected the labyrinthine strategies employed by the Lapsus$ extortion group to infiltrate a multitude of organizations boasting robust…
hack and bug bounty
Understanding Lapsus$ Group’s SIM-Swapping Attacks
Medium
Understanding Lapsus$ Group’s SIM-Swapping Attacks
In a striking revelation, the U.S. government has meticulously dissected the labyrinthine strategies employed by the Lapsus$ extortion group to infiltrate a multitude of organizations boasting robust…
hack and bug bounty
The Role of Penetration Testing in Appsec
Medium
The Role of Penetration Testing in Appsec
Penetration testing plays an important role in application security by identifying vulnerabilities and weaknesses in applications. It helps…
hack and bug bounty
Setting Up Your Ethical Hacking Lab: Tools and Resources for Beginners
Medium
Setting Up Your Ethical Hacking Lab: Tools and Resources for Beginners
As you embark on your journey to become an ethical hacker, one of the first steps is setting up a dedicated hacking lab. This controlled…
hack and bug bounty
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
Medium
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
An outstanding & thought-provoking podcast on PRIVACY and IoT hacking
hack and bug bounty
Introduction to Ethical Hacking: A Pathway to Cybersecurity Mastery
Medium
Introduction to Ethical Hacking: A Pathway to Cybersecurity Mastery
In the digital age, where technology is shaping neaarly every aspect of our lives, the need for robust cybersecurity has never been more…
hack and bug bounty
The Anatomy of a Robust Penetration Testing Program
Medium
The Anatomy of a Robust Penetration Testing Program
Cybersecurity goes beyond building robust defenses — with the continuous evolution of cyber threats, it becomes crucial to adopt a…
hack and bug bounty
Blog on Types of Hackers.
Medium
Blog on Types of Hackers.
Introduction: In today’s world or digital age the word hacker has become a famous word. Hackers have many skills starting from safeguarding…
hack and bug bounty
Recover Stolen Bitcoin
Medium
Recover Stolen Bitcoin
I’m a victim of the LIQULDOHN cryptocurrency investment scam, I was asked to deposit £700 which I did and it tripled to £2200 within 1 hour. That got my interest, The next deposit was £3,500 and my…
hack and bug bounty
Unveiling Cryptographic Hashes: From Security Shields to Hash Cracking Adventure
Medium
Unveiling Cryptographic Hashes: From Security Shields to Hash Cracking Adventure
hack and bug bounty
PCI DSS Remediation and Implementation
Medium
PCI DSS Remediation and Implementation
PCI remediation is a crucial undertaking for any organization aiming to achieve full PCI compliance with the 12 technical and operational…
hack and bug bounty
One way to test the security of a BroadcastReceiver in an Android application.
Medium
One way to test the security of a BroadcastReceiver in an Android application.
Recently, I was tasked to conduct an audit of a mobile application, so I prepared a checklist with a list of tests that should be…
hack and bug bounty
How does Blockchain Penetration Testing assess the security of a blockchain system?
Medium
How does Blockchain Penetration Testing assess the security of a blockchain system?
In an era where data breaches and cyber-attacks have become all too common, blockchain technology has emerged as a beacon of trust and…
hack and bug bounty
Double Pivoting for Newbies with Ligolo-ng
Medium
Double Pivoting for Newbies with Ligolo-ng
Moving laterally through target networks can be confusing for newbies. Utilizing Ligolo-ng can bridge the gap.
hack and bug bounty
Manual vs automatic testing for SQL injection
Medium
Manual vs automatic testing for SQL injection
Overview
hack and bug bounty
Lab: Username enumeration via different responses — 3 | 2023
Medium
Lab: Username enumeration via different responses — 3 | 2023
To solve the lab, enumerate a valid username, brute-force this user’s password, then access their account page | Karthikeyan Nagaraj
hack and bug bounty
Passed OSCP 2023 with 90 points, details here.
Medium
Passed OSCP 2023 with 90 points, details here.
Introduction
hack and bug bounty
8 Reasons For Companies To Hire a Penetration Testing Professional
Medium
8 Reasons For Companies To Hire a Penetration Testing Professional
In today’s digital age, where cyber threats are constantly evolving and becoming more sophisticated, the importance of cybersecurity cannot…
hack and bug bounty
Cyber Briefing:2023.08.24
Medium
Cyber Briefing:2023.08.24
👉
What’s going on in the cyber world today? Openfire Vulnerable, Barracuda Email Security, FBI, Roblox, npm packages, Luna Token Grabber…
hack and bug bounty
OverTheWire-Bandit(Part-3)(WriteUp)
Medium
OverTheWire-Bandit(Part-3)(WriteUp)
Hey Everyone! Welcome back. Last time within Part-2, I finished off upto Level 22 –> 23. So, for the introduction and basic information…