hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Using direct IP addresses in malware
Medium
Advantages :
Using direct IP addresses in malware can have both advantages and disadvantages for the attacker. Here are some considerations:
hack and bug bounty
Cyber Briefing: 2023.11.27
Medium
Cyber Briefing: 2023.11.27
👉
What’s happening in cybersecurity today?
hack and bug bounty
API — OWAS Top 10 (Part 2) | Broken Authentication
Medium
API — OWAS Top 10 (Part 2) | Broken Authentication
Broken Authentication…
hack and bug bounty
My bug bounty journey: #1 Linux
Medium
My bug bounty journey: #1 Linux
Hello, my name is Oscar, I have no experience in web security and just a little in coding. My dream would be to become an ethical hacker so…
hack and bug bounty
HackTheBox — Web Attacks: From XXE Injection to Advanced Local File Disclosure
Medium
HackTheBox — Web Attacks: From XXE Injection to Advanced Local File Disclosure
In my previous blog post, HackTheBox — Web Attacks: From XXE Injection to Local File Disclosure, I went over how to use XXE Injection to…
hack and bug bounty
Code4rena Audit
Medium
Code4rena Audit
To bolster platform security, Panoptic embarks on an audit with Code4rena. All auditooors from coding experts to engaged community members…
hack and bug bounty
“Navigating Risks: Vulnerability Stemming from a Third-Party Integration”
Medium
“Navigating Risks: Vulnerability Stemming from a Third-Party Integration”
This article is split into two parts. The first part explores details about the third-party vendor, The second part focuses specifically on…
hack and bug bounty
Introduction to Ethical Hacking: Unveiling the Principles and Practices
Medium
Introduction to Ethical Hacking: Unveiling the Principles and Practices
hack and bug bounty
Twitter in Turmoil as Musk Continues to Ruffle Feathers
Medium
Twitter in Turmoil as Musk Continues to Ruffle Feathers
Elon Musk announced last month that X, formerly known as Twitter, will begin charging new users in New Zealand and the Philippines $1…
hack and bug bounty
InfoSecSherpa’s News Roundup for Monday, November 27, 2023
Medium
InfoSecSherpa’s News Roundup for Monday, November 27, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
HackTheBox — Web Attacks: Error Based XXE to exfiltrate data
Medium
HackTheBox — Web Attacks: Error Based XXE to exfiltrate data
From my previous blog post, HackTheBox — Web Attacks: From XXE Injection to Advanced Local File Disclosure, I went over a technique to…
hack and bug bounty
The Crucial Role of Ethics in Cybersecurity
Medium
The Crucial Role of Ethics in Cybersecurity
Hi there! This week I’ll be delving into ethics and it’s importance in cybersecurity.
hack and bug bounty
HackTheBox — Web Attacks: XXE with Blind Exfiltration Data
Medium
HackTheBox — Web Attacks: XXE with Blind Exfiltration Data
In my previou blog post, HackTheBox — Web Attacks: Error Based XXE to exfiltrate data, I went over the scenario in which we take advantage…
hack and bug bounty
Catching C2s with Regex Signatures, TLS Certificates, and OSINT
Medium
Catching C2s with Regex Signatures, TLS Certificates, and OSINT
Command and Control (C2) servers play a crucial role in cyber threats, acting as a communication hub for malicious activities. Detecting…
hack and bug bounty
Apple security research.
Medium
Apple security research.
Experience with apple bug bounty – worst bug bounty program i have ever seen . They fix bugs and not pay you at all. Literally they are saving money . I feel like i am working for free . If there are…
hack and bug bounty
Information Security Management Concepts Explained | TryHackMe
Medium
Information Security Management Concepts Explained | TryHackMe
We covered information security management concepts such as information security governance, information security regulations, risk…
hack and bug bounty
Best Application Methods for Android Security
Medium
Best Application Methods for Android Security
This article explores the best application methods for Android security, helping users safeguard their personal data.
hack and bug bounty
Buffer Overflow Exploitation with Radare2 | P21 | HackTheBox Reg
Medium
Buffer Overflow Exploitation with Radare2 | P21 | HackTheBox Reg
We covered another example of a vulnerable binary to buffer overflow vulnerability. The binary has NX enabled to prevent code execution in…
hack and bug bounty
“The Future of Ethical Hacking Trends and Innovations”
Medium
“The Future of Ethical Hacking Trends and Innovations”
In the ever-evolving landscape of cybersecurity, ethical hacking stands as a crucial line of defense against cyber threats. As technology…
hack and bug bounty
“IoT Security Taming the Wild West of Ethical Hacking”
Medium
“IoT Security Taming the Wild West of Ethical Hacking”
In the dynamic landscape of the Internet of Things (IoT), where billions of interconnected devices communicate seamlessly, the importance…
hack and bug bounty
“Ethical Hacking in the Cloud Securing Virtual Spaces”
Medium
“Ethical Hacking in the Cloud Securing Virtual Spaces”
As organizations rapidly migrate their infrastructure to the cloud, the need for robust cybersecurity measures becomes paramount. Ethical…