hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Scanning for Padding Oracles
Blogspot
Scanning for Padding Oracles
As you might have heard, we recently got our paper on padding oracle attacks accepted to the USENIX Security Conference. In this paper, we ...
hack and bug bounty
Playing with TLS-Attacker
Blogspot
Playing with TLS-Attacker
In the last two years, we changed the TLS-Attacker Project quite a lot but kept silent about most changes we implemented. Since we do not h...
hack and bug bounty
How To Spoof PDF Signatures
Blogspot
How To Spoof PDF Signatures
One year ago, we received a contract as a PDF file. It was digitally signed. We looked at the document - ignoring the "certificate is not tr...
hack and bug bounty
Practical Bleichenbacher Attacks on IPsec IKE
Blogspot
Practical Bleichenbacher Attacks on IPsec IKE
We found out that reusing a key pair across different versions and modes of IPsec IKE can lead to cross-protocol authentication bypasses, e...
hack and bug bounty
Practical Dictionary Attack on IPsec IKE
Blogspot
Practical Dictionary Attack on IPsec IKE
We found out that in contrast to public knowledge, the Pre-Shared Key (PSK) authentication method in main mode of IKEv1 is susceptible to o...
hack and bug bounty
Real World Bug Hunting: Information Disclosure in Error Messages
Medium
Real World Bug Hunting: Information Disclosure in Error Messages
Hunting for bugs doesn’t have to be complex. This is a quick but informative story of how we found a vulnerability under 5 minutes on a…
hack and bug bounty
Pros and cons of clustering AppSec tooling
Medium
Pros and cons of clustering AppSec tooling
Clustering of Application Security tooling refers to the use of multiple tools and techniques to improve the security of an application…
hack and bug bounty
Agent-Server Authentication Design Pattern
Medium
Agent-Server Authentication Design Pattern
I have come across many agent based distributed systems like OEM, AV solutions and Splunk which need to communicate with a centralized server. This communication is often sensitive, carrying data…
hack and bug bounty
The Next Generation of App Development
Medium
The Next Generation of App Development
“ Robots are not going to replace humans, they are going to make their jobs much more humane. Difficult, demeaning, demanding, dangerous…
hack and bug bounty
How I Discovered My First CVE and How You Can Find Yours Too!
Medium
How I Discovered My First CVE and How You Can Find Yours Too!
Hey folks!!, Rajdip here, and I’ve got an exciting write-up for you today. We’ll be delving into the intriguing world of cybersecurity…
hack and bug bounty
Hosted vs SaaS AppSec tools
Medium
Hosted vs SaaS AppSec tools
Hosted application security tools offer several advantages:
hack and bug bounty
Cracking the Code: AppSec Adventures on HTB | Toxic | Web Challenge
Medium
Cracking the Code: AppSec Adventures on HTB | Toxic | Web Challenge
Welcome back and how do you do fellow hackers? I’m Hachiko, and that little guy next to me is my trusty hacker-cat, Babycat.
hack and bug bounty
Machine Learning Vulnerabilities
Medium
Machine Learning Vulnerabilities
An overview of some vulnerabilities found in ML Libraries
hack and bug bounty
Revolutionizing Bug Bounty Hunting: Unleashing the AI Advantage with Chat GPT
Medium
Revolutionizing Bug Bounty Hunting: Unleashing the AI Advantage with Chat GPT
With Chat GPT+, unlock the next phase of bug bounty hunting. Explore the cutting-edge field of AI-driven cybersecurity as we look at how…
hack and bug bounty
How to perform dynamic analysis of a smart contract with Myth
Medium
How to perform dynamic analysis of a smart contract with Myth
Myth is a powerful tool to find vulnerabilities in smart contracts, learn how to use it.
hack and bug bounty
4.1 Lab: OS command injection, simple case | 2023
Medium
4.1 Lab: OS command injection, simple case | 2023
To solve the lab, execute the whoami command to determine the name of the current user | Karthikeyan Nagaraj
hack and bug bounty
Host Header Injection / Redirect on Spotify — Bounty $200
Medium
Host Header Injection / Redirect on Spotify — Bounty $200
In the realm of cybersecurity, uncovering vulnerabilities is a vital step in fortifying digital landscapes. My journey led me to the…
hack and bug bounty
Ability to delete other user’s companies
Medium
Ability to delete other user’s companies
hack and bug bounty
click jacking email report
Medium
click jacking email report
Subject: Important Security Notice
hack and bug bounty
Getting Started with Bug Bounty in 2023
Medium
Getting Started with Bug Bounty in 2023
In today’s digital age, cybersecurity has never been more critical. As technology evolves, so do the threats that target it. Bug bounty…
hack and bug bounty
InfoSecSherpa’s News Roundup for Friday, September 1, 2023
Medium
InfoSecSherpa’s News Roundup for Friday, September 1, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!