hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
RootMe-Tryhackme
Medium
RootMe-Tryhackme
Scan the machine, how many ports are open?
hack and bug bounty
23.1 Lab: CORS vulnerability with trusted null origin | 2023
Medium
23.1 Lab: CORS vulnerability with trusted null origin | 2023
This website has an insecure CORS configuration in that it trusts the “null” origin.To solve the lab, craft some JavaScript that uses CORS…
hack and bug bounty
Cyber Briefing: 2023.11.14
Medium
Cyber Briefing: 2023.11.14
👉
What’s the latest in the cyber world today? Python Malware Targets Docker API, Ducktail Stealer Strikes India, Ethereum Function…
hack and bug bounty
Master the Art of Ethical Hacking: A Comprehensive Guide for Beginners
Medium
Master the Art of Ethical Hacking: A Comprehensive Guide for Beginners
Introduction: Welcome to the world of ethical hacking, where curiosity meets cybersecurity. In this guide, we’ll explore the essential…
hack and bug bounty
Har Har Hijack: The Okta Plunder
Medium
Har Har Hijack: The Okta Plunder
Lab sheet with VM Download located at the bottom of this document.
hack and bug bounty
COMPTIA Security+ SY0–601 Study Notes
Medium
COMPTIA Security+ SY0–601 Study Notes
From COMPTIA:
hack and bug bounty
How Does Generative AI Affect Cybersecurity Landscape?
Medium
How Does Generative AI Affect Cybersecurity Landscape?
The rapid advancement of generative AI models like ChatGPT, DALL-E 2, and others have sparked much discussion on how this technology will…
hack and bug bounty
“Fortifying Cyber Defenses: The Crucial Role of Continuous Security Monitoring in 2023”
Medium
“Fortifying Cyber Defenses: The Crucial Role of Continuous Security Monitoring in 2023”
In the year 2023, the global average cost of a data breach has soared to a staggering $4.45 million. Beyond the immediate financial…
hack and bug bounty
Project 2510: Bug Bounty Challenge — Day 9/25
Medium
Project 2510: Bug Bounty Challenge — Day 9/25
Welcome to Day 9.
hack and bug bounty
bWAPP PHP Code Injection
Medium
bWAPP PHP Code Injection
PHP Code Injection Nedir?
hack and bug bounty
Will Meta’s Bet on Creators Work?
Medium
Will Meta’s Bet on Creators Work?
Creator Trust Underpins Meta’s Strategy For Threads
hack and bug bounty
Analytical Methodology in InfoSec
Medium
Analytical Methodology in InfoSec
A brief primer on analysis and detection
hack and bug bounty
Endpoint Security: The First Line of Defence in Your Digital Strategy
Medium
Endpoint Security: The First Line of Defence in Your Digital Strategy
In an era where cyber threats are increasingly sophisticated, endpoint security has emerged as a crucial element in safeguarding business…
hack and bug bounty
HackerOne Surpasses $300 Million in Rewards for Ethical Hackers
Medium
HackerOne Surpasses $300 Million in Rewards for Ethical Hackers
HackerOne, a pioneer in bug bounty platforms, proudly announces crossing the $300 million mark in awards for ethical hackers and vulnerability researchers. This milestone comes as thirty hackers have…
hack and bug bounty
DNS C2 — When Malware Goes Incognito!
Medium
DNS C2 — When Malware Goes Incognito!
DNS (Domain Name System) Command and Control (C2) refers to a technique used by malware authors and attackers to establish communication…
hack and bug bounty
Critical Security Flaws Found in NGINX Ingress Controller for Kubernetes
Medium
Critical Security Flaws Found in NGINX Ingress Controller for Kubernetes
Three high-severity security vulnerabilities have been exposed in the NGINX Ingress controller for Kubernetes, which pose a risk of secret credential theft. The vulnerabilities include:
—…
hack and bug bounty
HackTheBox-Keeper(WriteUp)
Medium
HackTheBox-Keeper(WriteUp)
Hello Lovely People! How’s everything going? I hope everything great. So, back with another one. Let’s Go!
hack and bug bounty
The first encounter: a hacking laboratory
Medium
The first encounter: a hacking laboratory
How to start testing tools and methods of Ethical Hacking.
hack and bug bounty
Mass Hunting XSS vulnerabilities
Medium
Mass Hunting XSS vulnerabilities
In this article, I would like to cover how it is possible to efficiently check thousands of endpoints for potential Cross Site Scripting…
hack and bug bounty
Default Credentials, P1 with $$$$ Reward in a Bug Bounty Program
Medium
Default Credentials, P1 with $$$$ Reward in a Bug Bounty Program
Somewhere in the world. November 2023
hack and bug bounty
IDOR “Insecure direct object references”, my first P1 in Bugbounty
Medium
IDOR “Insecure direct object references”, my first P1 in Bugbounty
First Whoami : Dris R. A Security Researcher, Penetration Tester from Paris ,France.