hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
RootMe CTF | TryHackMe
Medium
RootMe CTF | TryHackMe
Begin by launching the virtual machine, and as it deploys, take note of the IP address assigned to your instance. Prerequisites: You need to establish connectivity by following the instructions…
hack and bug bounty
TryHackMe — Rootme CTF Writeup
Medium
TryHackMe — Rootme CTF Writeup
In this writeup we will be discussing in detail how to solve the Rootme room from TryHackMe. Let’s get started!
hack and bug bounty
THM: Root Me — My Hands-On Experience
Medium
THM: Root Me — My Hands-On Experience
Link: https://tryhackme.com/room/rrootme
hack and bug bounty
The Transformation of Twitter: A Year Under Elon Musk
Medium
The Transformation of Twitter: A Year Under Elon Musk
Summary
hack and bug bounty
Application Security in SSDLC
Medium
Application Security in SSDLC
In my previous blog, as I stated the high level explanation of Application Security, in this one I will be stating how it can be…
hack and bug bounty
EC2 User-data to RCE
Medium
EC2 User-data to RCE
Hi Guys, Today we are going to see how a single AWS misconfiguration can lead to remote code execution on an EC2 instance. In the upcoming…
hack and bug bounty
Hostedscan: The One-Stop Shop for Website Security
Medium
Hostedscan: The One-Stop Shop for Website Security
Don’t Wait Until It’s too Late
hack and bug bounty
How to Crush BSCP Exam in 75 Mins — BSCP Review
Medium
How to Crush BSCP Exam in 75 Mins — BSCP Review
Hi, I’m Ossama Yasser, and this is a guide to pass the Burp Suite Certified Practitioner Exam (BSCP) easily.
hack and bug bounty
Descubra como encontrar buckets ocultos na nuvem da Amazon S3!
Medium
Descubra como encontrar buckets ocultos na nuvem da Amazon S3!
👀
🔍
Hoje vamos falar sobre uma parada que é pura emoção: encontrar diretórios ocultos nos famosos S3 buckets da Amazon.
hack and bug bounty
Understanding Prototype Pollution Through Analogy
Medium
Understanding Prototype Pollution Through Analogy
In JavaScript, objects have a prototype, which is itself another object from which they inherit properties. When we create a new object, it can inherit properties and methods from a prototype object…
hack and bug bounty
Web Cache Poisoning: A Tale of Mischievous Mischief
Medium
Web Cache Poisoning: A Tale of Mischievous Mischief
Web Cache Poisoning is a type of cyber attack where an attacker manipulates a web cache (a temporary storage for web pages to reduce server load) to serve poisoned or malicious content to users. The…
hack and bug bounty
Race Condition Vulnerability Explained: The Train Station Analogy
Medium
Race Condition Vulnerability Explained: The Train Station Analogy
Imagine you’re at a busy train station, standing in front of two ticket machines. These machines are positioned side by side, and both access the same central database to check the availability of…
hack and bug bounty
Understanding SQL Injection Through the Lens of a Library
Medium
Understanding SQL Injection Through the Lens of a Library
Imagine a vast library, filled with countless books, journals, and manuscripts. This library is a cherished resource for a town, and people from all walks of life visit to borrow books or gather…
hack and bug bounty
Cross-Site Scripting (XSS) Explained with an Analogy: The Poisoned Candy
Medium
Cross-Site Scripting (XSS) Explained with an Analogy: The Poisoned Candy
Imagine the internet as a vast candy store, where websites are different candy stalls, and the candies represent the content you interact with. Cross-Site Scripting, commonly abbreviated as XSS, is a…
hack and bug bounty
Time-Traveling for Money: Discovering Secrets in Vintage JavaScript Files
Medium
Time-Traveling for Money: Discovering Secrets in Vintage JavaScript Files
Are you ready for an exciting digital adventure? Get ready to embark on a journey where hidden secrets and old code may lead you to…
hack and bug bounty
RootMe TryHackMe: WriteUp
Medium
RootMe TryHackMe: WriteUp
Task 1: Deploy the machine:-
hack and bug bounty
Unlocking the Secrets of ‘ROOTMe’: My TryHackMe Journey
Medium
Unlocking the Secrets of ‘ROOTMe’: My TryHackMe Journey
I started off my experience with ‘ROOTMe’ as an assignment, but it turned into fun and learning! As I delved deeper into the challenges, I…
hack and bug bounty
Common Ethical Hacking Techniques Explained: How They Help Uncover Vulnerabilities
Medium
Common Ethical Hacking Techniques Explained: How They Help Uncover Vulnerabilities
In a world where cyber threats are becoming increasingly sophisticated and pervasive, the importance of cybersecurity cannot be overstated…
hack and bug bounty
BAC — Bozuk Erişim Kontrolü Nedir? — A01:2021
Medium
BAC — Bozuk Erişim Kontrolü Nedir? — A01:2021
Bu yazıda erişim kontrolü kavramını ve “bozuk erişim kontrolü” zafiyetini basitleştirilmiş örneklerle inceleyeceğiz.
hack and bug bounty
Web Sockets in Web App Penetration Testing | 2023
Medium
Web Sockets in Web App Penetration Testing | 2023
In this section, we’ll explain what Web sockets is, describe some types, explain how to find and exploit various kinds of Web sockets and…
hack and bug bounty
Password-less Authentication
Medium
Password-less Authentication
What it is, how it works and what it solves…