hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Ethical Dilemmas on the Road: The Trolley Problem in Self-Driving Cars
Medium
Ethical Dilemmas on the Road: The Trolley Problem in Self-Driving Cars
The Streetcar Issue is a thought test in morals and moral way of thinking this is routinely used to find moral problems in conditions…
hack and bug bounty
Understanding The Zero Trust Cybersecurity Framework: A Paradigm Shift In Network And Data…
Medium
Understanding The Zero Trust Cybersecurity Framework: A Paradigm Shift In Network And Data…
In today’s digital landscape, where cyber threats are becoming increasingly sophisticated and prevalent, traditional security measures are…
hack and bug bounty
“OSCP vs. Other Cybersecurity Certifications Choosing the Right Path”
Medium
“OSCP vs. Other Cybersecurity Certifications Choosing the Right Path”
In the expansive realm of cybersecurity certifications, navigating the plethora of options can be daunting. The Offensive Security…
hack and bug bounty
PENETRATION TEST REPORT FOR KIOPTRIX
Medium
PENETRATION TEST REPORT FOR KIOPTRIX
Executive summary The penetration test was conducted to find and exploit the vulnerabilities in the Kioptrix VM and capture the flags within the VM.The purpose of these is to learn the basic tools…
hack and bug bounty
Revealing the Sneaky Hack: OOB SQL Injection and Its Real-world Discovery in My Daily Pentesting…
Medium
Revealing the Sneaky Hack: OOB SQL Injection and Its Real-world Discovery in My Daily Pentesting…
This article aims to demystify the complexities of OOB SQL injection
hack and bug bounty
SSRF (LAB)
Medium
SSRF (LAB)
Description
hack and bug bounty
22.1 Lab: JWT authentication bypass via unverified signature | 2023
Medium
22.1 Lab: JWT authentication bypass via unverified signature | 2023
This lab uses a JWT-based mechanism for handling sessions. Due to implementation flaws, the server doesn’t verify the signature of any JWTs…
hack and bug bounty
Authentication Vulnerabilities- Lab #8 2FA (Two Factor Authentication) broken logic
Medium
Authentication Vulnerabilities- Lab #8 2FA (Two Factor Authentication) broken logic
For any correction / query /suggestion contact on Instagram dollarboysushil Twitter (X) dollarboysushil Youtube dollarboysushil
hack and bug bounty
ICMP WALKTHROUGH PROVING GROUNDS
Medium
ICMP WALKTHROUGH PROVING GROUNDS
— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —
hack and bug bounty
Keep Track of Your Opposition Leader’s Instagram Activity
Medium
Keep Track of Your Opposition Leader’s Instagram Activity
In the fast-paced world of politics, keeping tabs on your opposition leader is crucial. Social media platforms, especially Instagram, offer…
hack and bug bounty
How to reset password in Kali Linux.
Medium
How to reset password in Kali Linux.
of bob218
hack and bug bounty
“Beyond the Basics Advanced Techniques for OSCP Preparation”
Medium
“Beyond the Basics Advanced Techniques for OSCP Preparation”
Preparing for the Offensive Security Certified Professional (OSCP) certification demands more than a foundational understanding of…
hack and bug bounty
“Mastering the Art of Penetration Testing OSCP Insights”
Medium
“Mastering the Art of Penetration Testing OSCP Insights”
Penetration testing is both an art and a science, requiring a unique blend of technical expertise, creativity, and problem-solving skills…
hack and bug bounty
“OSCP Exam Tactics Strategies for Success in the Hands-On Challenge”
Medium
“OSCP Exam Tactics Strategies for Success in the Hands-On Challenge”
The Offensive Security Certified Professional (OSCP) exam is a rigorous 24-hour hands-on challenge that puts your penetration testing…
hack and bug bounty
Resources for Women in Cybersecurity
Medium
Resources for Women in Cybersecurity
Current State of the Workforce
hack and bug bounty
How to empty iptables and delete firewall rules.
Medium
How to empty iptables and delete firewall rules.
of bob218
hack and bug bounty
NintendoHunt | Cyberdefenders.org
Medium
NintendoHunt | Cyberdefenders.org
Writeup of NintendoHunt room
hack and bug bounty
What is Penetration Testing and Why is it Crucial for Businesses?
Medium
What is Penetration Testing and Why is it Crucial for Businesses?
Penetration testing, also known as pen testing or ethical hacking, is the practice of authorized professionals testing a computer system…
hack and bug bounty
Finding Sneaky Hackers, The Ultimate Way of Stalking Cyber Intruders (Without a Trench Coat)
Medium
Finding Sneaky Hackers, The Ultimate Way of Stalking Cyber Intruders (Without a Trench Coat)
Lateral movement is a term used in cybersecurity to describe the techniques that attackers use to move horizontally through a network after…
hack and bug bounty
Dumping Hashes with Mimikatz:
Medium
Dumping Hashes with Mimikatz:
Mimikatz is a well-liked post-exploitation tool that hackers use to steal crucial authentication credentials stored in memory, particularly…
hack and bug bounty
Project 2510: Bug Bounty Challenge — Day 7/25
Medium
Project 2510: Bug Bounty Challenge — Day 7/25
Welcome to Day 7.