hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Understanding the Benefits of Using Parrot OS Linux for Penetration Testing
Medium
Understanding the Benefits of Using Parrot OS Linux for Penetration Testing
Introduction
hack and bug bounty
... ..?
Medium
𝚃𝚑𝚎𝚛𝚎 𝚒𝚜 𝚗𝚘 𝚙𝚕𝚊𝚌𝚎 𝚕𝚒𝚔𝚎 𝟷𝟸𝟽.𝟶.𝟶.𝟷 ..?
hack and bug bounty
First week of OSCP
Medium
First week of OSCP
I have completed my first week of OSCP by following the OffSec PEN-200 Learning Plan — 12 Week, the issue that I have faced is that I did…
hack and bug bounty
Portswigger Lab: Server-side pause-based request smuggling
Medium
Portswigger Lab: Server-side pause-based request smuggling
Introduction
hack and bug bounty
“Navigating the Cyber Nexus: Decoding Ethical Hacking and Penetration Testing”
Medium
“Navigating the Cyber Nexus: Decoding Ethical Hacking and Penetration Testing”
Introduction:
hack and bug bounty
İT sahəsinin bütün qollarına aid kurslar və kitablar arxivi. Bütün linklər işləkdir.
Medium
İT sahəsinin bütün qollarına aid kurslar və kitablar arxivi. Bütün linklər işləkdir.
Kanalıma abunə olub İT sahəsinə aid daha çox məlumatlar, ən əsası legal Hacking işləmləri görə bilərsiniz. Sizlər üçün praktik videolar çəkib paylaşıram mənə dəstək olsaz sevinərəm
🙏
Atıl…
hack and bug bounty
TryHackMe: Blue (Eternal Blue)
Medium
TryHackMe: Blue (Eternal Blue)
About the vulnerability:
hack and bug bounty
Exploring Cyber Security: Resources for Red Team and Blue Team Activities
Medium
Exploring Cyber Security: Resources for Red Team and Blue Team Activities
Hello everyone! In today’s blog, I’m going to highlight the resources available on the internet for both Red Team and Blue Team activities.
hack and bug bounty
Dumping Passwords From Database — Union-based SQL Injection Scripting
Medium
Dumping Passwords From Databases — Union-based SQL Injection Scripting
In the last article we discussed various types of SQL injection and presented a basic example of an in-band union-based injection attack…
hack and bug bounty
Brute It TryHackMe Walkthrough
Medium
Brute It TryHackMe Walkthrough
Hi Everyone!! This is Abel V. In this article, I will be sharing a walkthrough of “Brute It” from TryHackMe. I’ll guide you through the…
hack and bug bounty
Behind the Scenes of a $2500 Reward: Exploring SQL Injection on a Search Page
Medium
Behind the Scenes of a $2500 Reward: Exploring SQL Injection on a Search Page
In the vast landscape of cyberspace, where lines of code construct virtual realms and digital doors protect valuable information, an…
hack and bug bounty
Sudoedit Local Privilege Escalation Vulnerability (CVE-2023–22809)
Medium
Sudoedit Local Privilege Escalation Vulnerability (CVE-2023–22809)
On January 18th, 2023, Synacktiv released an advisory regarding a vulnerability in sudo (CVE-2023–22809). This vulnerability allows users…
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, August 27, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, August 27, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
My Checklist
Medium
My Checklist
According to data from prominent security standards such as OWASP,ISO,COBIT,NIST and popular security certificate providers such as…
hack and bug bounty
Guesswork Needed — Scripting for Blind SQL Injection
Medium
Guesswork Needed — Scripting for Blind SQL Injection
Topic introduction
hack and bug bounty
How I ethically hacked NASA via Google Dorking.
Medium
How I ethically hacked NASA via Google Dorking.
Hey! This is Prince Roy, a cyber security researcher. Recently, I have discovered an information disclosure vulnerability in one of the…
hack and bug bounty
Google Dorks: advance googling
Medium
Google Dorks: advance googling
It is an advance searching method on Google, commonly used by hackers, so they refer to as “Google Hacking”. It is a step of Information…
hack and bug bounty
Parent PID Spoofing —Process Identifier Manipulation
Medium
Parent PID Spoofing —Process Identifier Manipulation
Welcome to this in-depth article on Parent PID (Process Identifier) Spoofing, a technique that lies at the heart of malware development and…
hack and bug bounty
Experiment #7 (Under Lock & Key)
Medium
Experiment #7 (Under Lock & Key)
Previously in Experiment #6, we had a chance to explore API Keys and how to hide them the native way. We got to see how Google’s…
hack and bug bounty
My Journey to PNPT
Medium
My Journey to PNPT
I recently obtained the Practical Network Penetration Tester certification offered by TCM Security and I’m writing this post to tell you…
hack and bug bounty
DEF CON 31 WebSploit Labs Challenge Walkthrough
Medium
DEF CON 31 WebSploit Labs Challenge Walkthrough
I co-founded and one of the leads of the DEF CON Red Team Village. At DEF CON 31’s Red Team Village, I conducted two workshops: