hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Understanding Firewalls in Network Security
Medium
Understanding Firewalls in Network Security
of bob218
hack and bug bounty
XSS on the Oauth callback URL with CSP bypass leading to zero-click account takeover
Medium
XSS on the Oauth callback URL with CSP bypass leading to zero-click account takeover
XSS on OAuth callback URL. Weaponizing the issue allowed zero-click account takeover.
hack and bug bounty
ChatGPT: The Ultimate Tool for Penetration Testers — SecurityCipher
Medium
ChatGPT: The Ultimate Tool for Penetration Testers — SecurityCipher
As a penetration tester or bug bounty hunter, you know the importance of having the right tools at your disposal. ChatGPT is a powerful AI…
hack and bug bounty
BBP#1 (BugBountyProgram Story) Zolo
Medium
BBP#1 (BugBountyProgram Story) Zolo
Story:
hack and bug bounty
Broken Object Level Authorization Vs. Broken Functionality Level Authorization | API Hacking |
Medium
Broken Object Level Authorization Vs. Broken Functionality Level Authorization | API Hacking |
In this blog, we will explore two significant security vulnerabilities: Broken Object Level Authorization (BOLA) and Broken Functionality…
hack and bug bounty
Mastering SQL Injection on DVWA Low Security with Burp Suite: A Comprehensive Guide — StackZero
Medium
Mastering SQL Injection on DVWA Low Security with Burp Suite: A Comprehensive Guide — StackZero
Master DVWA SQL injection on low-security with our Burp Suite tutorial. Dive into efficient cybersecurity techniques today.
hack and bug bounty
Disclosure email address of any Wordpress user via redacted-service
Medium
Disclosure email address of any Wordpress user via redacted-service
Hello fellas, in this write-up, I’m gonna talk about disclosing email address of any WordPress user by using an another service within…
hack and bug bounty
$1000 Bug using simple Graphql Introspection query
Medium
$1000 Bug using simple Graphql Introspection query
Welcome to my blog! In this post, I will be discussing my experience in the security testing of an application’s implementation of…
hack and bug bounty
Reverse SSH SOCKS proxy via Alpine image
Medium
Reverse SSH SOCKS proxy via Alpine image
Penetration testing often involves encountering fully restricted machines within the target network. How to build a gateway inside…
hack and bug bounty
Beyond Error Messages: Super Admin Deletion due to Broken Access Control (€€€)
Medium
Beyond Error Messages: Super Admin Deletion due to Broken Access Control (€€€)
Hi, Fellow Hunters, Ram Ram Bhyi Sarya Ne
hack and bug bounty
TryHackMe-Ultratech(WriteUp)
Medium
TryHackMe-Ultratech(WriteUp)
Hello Lovely People! How’s everything going? I hope everything great. So, back with another one. Let’s Go!
hack and bug bounty
How I got Access to Auth0 Management API !!
Medium
How I got Access to Auth0 Management API !!
Recently, while hunting on a private bug bounty program I got full API Access to target’s Auth0 Management API. This was my first comeback…
hack and bug bounty
Bug Bounty Hunting — Essential Tools and Techniques
Medium
Bug Bounty Hunting — Essential Tools and Techniques
Welcome to the Bug Bounty series where we explore the exciting world of ethical hacking. In this blog post, we will dive into the…
hack and bug bounty
$1120: ATO Bug in Twitter’s
Medium
$1120: ATO Bug in Twitter’s
Explore the story of a $1120 Twitter bug, I found — a security flaw that allowed attackers to seize full control of accounts without…
hack and bug bounty
How I Could Get Anyone Arrested Knowing Their IP Address
Medium
How I Could Get Anyone Arrested Knowing Their IP Address
Few ISP might allocate single IP to multiple persons or allocate IP’s dynamically. (In these cases this technique might not work correctly) Okay, what can a attacker accomplish by knowing public ip…
hack and bug bounty
Akamai Bypass! Advanced XSS.
Medium
Akamai Bypass! Advanced XSS.
In the name of God
hack and bug bounty
ChatGPT for Bug Bounty: Top Prompts for Automation
Medium
ChatGPT for Bug Bounty: Top Prompts for Automation
Top-tier Security Researchers are actively adopting ChatGPT in Cybersecurity. Let’s explore the most common ChatGPT prompts for Bug Bounty.
hack and bug bounty
A web cache deception chained to a CSRF, the recipe
Medium
A web cache deception chained to a CSRF, the recipe
Recently, I received a bounty for a vulnerability discovered on an e-commerce site allowing the personal information — including the…
hack and bug bounty
CTBB Podcast — Attack Vector Ideation
Medium
CTBB Podcast — Attack Vector Ideation
In this article, I share my views mixed with Justin’s ideas in his video
hack and bug bounty
What To Do After Choosing a Target? Part 01 | Bug Bounty
Medium
What To Do After Choosing a Target? Part 01 | Bug Bounty
This is the problem faced by most bug hunters in the beginning
hack and bug bounty
Top 5 Red Flags of Bug Bounty Program
Medium
Top 5 Red Flags of Bug Bounty Program
The critical skill of many top tier bug bounty hunters is to select the right program and dedicate their time.