hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
XXE Attack Techniques to Bypass WAF and IDS
Medium
XXE Attack Techniques to Bypass WAF and IDS
In today’s digital landscape, web applications have become the lifeblood of our online world. However, with great convenience comes great…
hack and bug bounty
12.2 Lab: Exploiting NoSQL operator injection to bypass authentication | 2023
Medium
12.2 Lab: Exploiting NoSQL operator injection to bypass authentication | 2023
The login functionality for this lab is powered by a MongoDB NoSQL database. It is vulnerable to NoSQL injection using MongoDB operators…
hack and bug bounty
XXE in IoT Devices: Hacking the Smart Home
Medium
XXE in IoT Devices: Hacking the Smart Home
The Internet of Things (IoT) has revolutionized the way we interact with our homes. Smart devices, such as thermostats, cameras, and voice…
hack and bug bounty
Cybersecurity Alert! ️ Let’s Dive into the SANS TOP 25 Most Dangerous Software Errors
Medium
💡
Cybersecurity Alert!
🛡️
Let’s Dive into the SANS TOP 25 Most Dangerous Software Errors
💻
🔒
Hey Medium fam, are you ready to dive into the world of cybersecurity?
💻
hack and bug bounty
Exploiting SMB on Blue Box VM
Medium
Exploiting SMB on Blue Box VM
Pentesting Blue Box
hack and bug bounty
Page admin disclosure via facebook profile link embedded in instagram
Medium
Page admin disclosure via facebook profile link embedded in instagram
There is a feature in instagram to show your linked facebook account. On the same way, an instagram user also can link his/her facebook page. When doing these together, an attacker can disclose the…
hack and bug bounty
Google Dorking can reward us $$$$
Medium
Google Dorking can reward us $$$$
“Google Dorking,” a practice that utilizes advanced search operators to pinpoint hidden or confidential information on the web. In this…
hack and bug bounty
“XXE in Office Documents” A Lesser-Known Attack Vector
Medium
“XXE in Office Documents” A Lesser-Known Attack Vector
When we think about cybersecurity threats, our minds often jump to familiar scenarios like phishing emails, malware-infected downloads, or…
hack and bug bounty
“XXE in Mobile Applications” Finding the Needle in the Haystack
Medium
“XXE in Mobile Applications” Finding the Needle in the Haystack
In an era dominated by mobile technology, our smartphones have become extensions of ourselves, serving as personal assistants…
hack and bug bounty
Cyber Briefing: 2023.10.06
Medium
Cyber Briefing: 2023.10.06
👉
What are the latest cybersecurity alerts, incidents, and news?
hack and bug bounty
JellyPwn
Medium
JellyPwn
RCE/Reverse Shell through installing Jellyfin plugins
hack and bug bounty
Hacking: Myth vs Reality
Medium
Hacking: Myth vs Reality
Hacking, a term that has become synonymous with cybercrime and clandestine activities, is a concept shrouded in misconceptions. The popular…
hack and bug bounty
InfoSecSherpa’s News Roundup for Friday, October 6, 2023
Medium
InfoSecSherpa’s News Roundup for Friday, October 6, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Enhancing Code Security with DevSecOps: Part 1 — Connecting Git with AWS CodeCommit
Medium
Enhancing Code Security with DevSecOps: Part 1 — Connecting Git with AWS CodeCommit
Hello, everyone! I’m excited to take this journey with you and walk you through the steps to enhance the security of your code throughout…
hack and bug bounty
Reflected Cross-Site Scripting in Hidden Input Fields
Medium
Reflected Cross-Site Scripting in Hidden Input Fields
About XSS?
Cross-Site Scripting is a type of vulnerability that allows an attacker to inject JavaScript code into an application, deceiving the application into treating it as legitimate code. This…
hack and bug bounty
Qradar101 Blue Team Challenge
Medium
Qradar101 Blue Team Challenge
Category: Threat Hunting
hack and bug bounty
A Beginner’s Guide to AJP Proxy: Bridging Apache and Tomcat
Medium
A Beginner’s Guide to AJP Proxy: Bridging Apache and Tomcat
Introduction
hack and bug bounty
The Kitchen Sink of Cybersecurity Roles
Medium
The Kitchen Sink of Cybersecurity Roles
750,000+ cybersecurity jobs are unfilled. Are you trying to get your foot in the door?
hack and bug bounty
Understanding the 5 phases of ethical hacking
Medium
Understanding the 5 phases of ethical hacking
Ethical hacking plays a crucial role in enhancing the security of networks and systems. Let’s dive into the five fundamental phases:
hack and bug bounty
Understanding UAC in Windows Systems: Token Security and Beyond
Medium
Understanding UAC in Windows Systems: Token Security and Beyond
In today’s evolving cyber world, User Account Control (UAC) has emerged as one of the core mechanisms used by Windows systems to protect…
hack and bug bounty
IP Spoofing, in a Cinematic way
Medium
IP Spoofing, in a Cinematic way
In the dimly lit streets of the digital arena, where neon lines of code crisscrossed the virtual landscape, there exists a technique that…