hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Gaining Admin Access via GraphQL
Medium
Gaining Admin Access via GraphQL
This is a simple story about chaining 2 vulnerabilities to gain access to an administrative website. I’m going to share the thought process…
hack and bug bounty
A Practical Playbook to Ethical Web Hacking— Contents Based on TryHackMe Jr Penetration Tester…
Medium
A Practical Playbook to Ethical Web Hacking— Contents Based on TryHackMe Jr Penetration Tester Learning Path
Hello cybersecurity learners and enthusiasts! If you are relatively new to ethical web hacking, this is a good starter guide for you. Here…
hack and bug bounty
The Importance of Gap Analysis in ISO/IEC 27001 Version Transition
Medium
The Importance of Gap Analysis in ISO/IEC 27001 Version Transition
What is ISO 27001 Gap Analysis?
hack and bug bounty
ISO/IEC 27001:2022 Version Transition
Medium
ISO/IEC 27001:2022 Version Transition
ISO/IEC 27001 Information Security Management System (ISMS) is the most effective way to provide managerial control over the information in…
hack and bug bounty
5+All Security Resource Digest for 2023–10–2
Medium
5+All Security Resource Digest for 2023–10–2
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Linux Privilege Escalation — Weak File Permission — /etc/passwd Writable
Medium
Linux Privilege Escalation — Weak File Permission — /etc/passwd Writable
The /etc/passwd file stores user account information for each user on the system. Each line in the file represents a single user accountf
hack and bug bounty
Find Processes with EnumProcesses
Medium
Find Processes with EnumProcesses
In the dynamic and ever-evolving landscape of cybersecurity, red teamers and malware developers find themselves at the forefront of…
hack and bug bounty
Best Ethical Hacking Tools For Secure Digital Marketing Services
Medium
Best Ethical Hacking Tools For Secure Digital Marketing Services
In today’s interconnected world, where businesses harness the internet’s power to engage with their audiences, cybersecurity stands as a paramount concern. The ever-evolving landscape of cyber…
hack and bug bounty
11.1 Lab: Exploiting XXE using external entities to retrieve files | 2023
Medium
11.1 Lab: Exploiting XXE using external entities to retrieve files | 2023
This lab has a “Check stock” feature that parses XML input and returns any unexpected values in the response. To solve the lab, inject an…
hack and bug bounty
Tips and Tricks for Effective SQL Injection Testing using SQLMap Tamper Scripts
Medium
Tips and Tricks for Effective SQL Injection Testing using SQLMap Tamper Scripts
Hello, in this post, I will be sharing information about SQLMap tamper scripts. So, what is SQLMap? What are tamper scripts in SQLMap? And…
hack and bug bounty
Nmap Commands Unveiled: Surfing the Cyber Seas!
⚓
Medium
🌐
Nmap Commands Unveiled: Surfing the Cyber Seas!
⚓
Ahoy, fellow cyber-surfers!
hack and bug bounty
Read Earth X Trilogy Omnibus: Omega by Steve Pugh,Doug Braithwaite,Steve Yeowell,Steve…
Medium
Read Earth X Trilogy Omnibus: Omega by Steve Pugh,Doug Braithwaite,Steve Yeowell,Steve…
Review Earth X Trilogy Omnibus Omega by Steve Pugh Doug Braithwaite Steve Yeowell Steve Sadowski Alex Ross Jim Krueger
hack and bug bounty
Download Spy x Family, Vol. 4 by Tatsuya Endo & Tatsuya Endo
Medium
Download Spy x Family, Vol. 4 by Tatsuya Endo & Tatsuya Endo
Review Spy x Family Vol by Tatsuya Endo Tatsuya Endo
hack and bug bounty
Read Mr X Stitch Guide to Cross Stitch, The by Jamie Chalmers
Medium
Read Mr X Stitch Guide to Cross Stitch, The by Jamie Chalmers
Review Mr X Stitch Guide to Cross Stitch The by Jamie Chalmers
hack and bug bounty
Open Redirects in IoT Devices: A Look into the Future
Medium
Open Redirects in IoT Devices: A Look into the Future
The Internet of Things (IoT) has ushered in an era of unprecedented connectivity, where everyday objects are becoming smart and…
hack and bug bounty
The Art of Social Engineering in Crypto Attacks
Medium
The Art of Social Engineering in Crypto Attacks
The world of cryptocurrency has witnessed remarkable growth over the past decade, with millions of people investing in and trading digital…
hack and bug bounty
“Uncovering the Cryptojacking Epidemic” A Guide for Bug Bounty Hunters
Medium
“Uncovering the Cryptojacking Epidemic” A Guide for Bug Bounty Hunters
In the ever-evolving landscape of cybersecurity threats, a new menace has been steadily gaining ground — cryptojacking. This silent…
hack and bug bounty
nOAuth: Account Takeover via Microsoft Oauth
Medium
nOAuth: Account Takeover via Microsoft Oauth
Hi everyone, I want to share a cool and easy account takeover I recently found. I was able to perform a full account takeover via Sign In…
hack and bug bounty
Cyber Briefing: 2023.10.02
Medium
Cyber Briefing: 2023.10.02
👉
What’s happening in cybersecurity today?
hack and bug bounty
️ Unleash the Power of the Digital Vigilante: Your Arsenal of Scanning Tools!
Medium
🛡️
Unleash the Power of the Digital Vigilante: Your Arsenal of Scanning Tools!
💻
🔍
In the ever-expanding digital frontier, knowledge is power, and reconnaissance is the name of the game.
hack and bug bounty
CRTP — Certified Red Team Professional Review
Medium
CRTP — Certified Red Team Professional Review
Note that the Certified Red Team Professional (CRTP) course and labs are offered by Altered Security who are creators of the course and…