hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
How I made a mundane bug into something impactful
Medium
How I made a mundane bug into something impactful
Hello again, today I will be going over another bug that I have found and reported. The company will remain redacted however the process…
hack and bug bounty
An Intro to Authentication Vulnerabilities — With Examples
Medium
An Intro to Authentication Vulnerabilities — With Examples
Authentication is the process through which the identity of the user of a system is verified. That means it is through authentication we…
hack and bug bounty
Supporting Sprocket Security's offensive security testing with BChecks, from Burp Suite
PortSwigger Blog
Supporting Sprocket Security's offensive security testing with BChecks, from Burp Suite
The US-based organization Sprocket Security provides continuous penetration testing services to customers by monitoring clients’ attack surfaces and searching for new and novel exploitation techniques
hack and bug bounty
A Crash Course in OAuth Demonstrated Proof of Possession (DPoP)
Medium
A Crash Course in OAuth Demonstrated Proof of Possession (DPoP)
Proof? You can’t handle the proof!
hack and bug bounty
Hack the box — Keeper
Medium
Hack the box — Keeper
Scanning IP: 10.1.11.127
hack and bug bounty
Application for bank manager for zero balance account
Medium
Application for bank manager for zero balance account
Bank Manager, SBI Bank, Magadi Road Branch Near Magadi Road metro station, Bengaluru- 454332
hack and bug bounty
What is Malware
Medium
What is Malware
Malware can take various forms and serve different malicious purposes, making it a significant cybersecurity threat. Here are some common…
hack and bug bounty
HTB — Bart | 74/100
Medium
HTB — Bart | 74/100
Hi! Here is a technical writeup of the HackTheBox machine Bart. This Medium rated box was a lot of fun and really drove home the…
hack and bug bounty
What is Cyber-Security?
Medium
What is Cyber-Security?
Imagine you’re living in a world where your secrets, bank accounts, and even your cat memes are all stored on computers or on your mobile…
hack and bug bounty
InfoSecSherpa’s News Roundup for Wednesday, September 6, 2023
Medium
InfoSecSherpa’s News Roundup for Wednesday, September 6, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
UAC on Windows: An Essential Security Gatekeeper
Medium
UAC on Windows: An Essential Security Gatekeeper
User Account Control (UAC) might occasionally annoy Windows users with its pop-up prompts, but its role as a crucial security feature…
hack and bug bounty
Hacking Websites for Ethical Hacking: A Comprehensive Guide
Medium
Hacking Websites for Ethical Hacking: A Comprehensive Guide
Are you looking for a legit hacker services ?
🌐
Visit Our Website: phantomhacker.su
📧
Email Us to Order: phantomhackings@gmail.com
hack and bug bounty
Business Logic Error
Medium
Business Logic Error
A frequently under-tested security area
hack and bug bounty
Theori 팀 인터뷰_saika (패치데이 팀)
Medium
[
🎤
Theori People] PatchDay팀 — saika
서비스의 보안 취약점을 사전에 발굴하고, 찾아낸 사람에게 포상금을 지급하는 제도를 아시나요? 국내 버그바운티의 긍정적인 인식과 문화를 주도하는 팀, 패치데이의 saika입니다.
hack and bug bounty
10 Useful Tips on How to Protect Yourself Against Cyberthreats
Medium
10 Useful Tips on How to Protect Yourself Against Cyberthreats
The best defence against cyber threats is a proactive one.
hack and bug bounty
SocketSleuth: Improving security testing for WebSocket applications
Medium
SocketSleuth: Improving security testing for WebSocket applications
Today, we are proud to announce the beta version of SocketSleuth, our new Burp Suite extension for performing security testing against WebSocket-based applications. SocketSleuth was created out of…
hack and bug bounty
A Lesson On Internet Identities: The Dread Pirate Roberts
Medium
A Lesson On Internet Identities: The Dread Pirate Roberts
How the founder of Silk Road was brought down by a Google search…
hack and bug bounty
My debut with a Critical Bug: How I found my first bug (API misconfiguration)
Medium
My debut with a Critical Bug: How I found my first bug (API misconfiguration)
Finally, the day arrived when I could share my own findings, rather than just reading other researchers’ findings (which I truly love to…
hack and bug bounty
How DNS Works — DNS Zone Transfer
Medium
How DNS Works — DNS Zone Transfer
What is DNS;
hack and bug bounty
Exploring Cross-Site Scripting (XSS) Vulnerabilities: Payloads, Techniques, and Mitigation
Medium
Exploring Cross-Site Scripting (XSS) Vulnerabilities: Payloads, Techniques, and Mitigation
Introduction
hack and bug bounty
Bounty Hacker — TryHackMe WriteUp
Medium
Bounty Hacker — TryHackMe WriteUp
Greetings, fellow readers and aspiring cyber adventurers,