hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
My Experience of Hacking Dutch Government
Medium
My Experience of Hacking Dutch Government
Bismillahi-r-Rahmani-r-Rahim
(In the name of Allah, the Compassionate, the Merciful)
Assalamu Alaikum (peace be upon you)
hack and bug bounty
How I get my first SWAG from SIDN (Sensitive Data Expose)
Medium
How I get my first SWAG from SIDN (Sensitive Data Expose)
بسم الله الرحمن الرحيم
hack and bug bounty
How I Create My First Tool With Python (UniqMe)
Medium
How I Create My First Tool With Python (UniqMe)
Assalamu Alaikum
hack and bug bounty
Automating REST Security Part 3: Practical Tests for Real-World APIs
Blogspot
Automating REST Security Part 3: Practical Tests for Real-World APIs
Automating REST Security Part 3: Practical Tests for Real-World APIs If you have read our two previous blogposts, you should now have a goo...
hack and bug bounty
Automating REST Security Part 2: Tool-based Analysis with REST-Attacker
Blogspot
Automating REST Security Part 2: Tool-based Analysis with REST-Attacker
Our previous blog post described the challenges in analyzing REST API implementations. Despite the lack of REST standardization, we learned ...
hack and bug bounty
Automating REST Security Part 1: Challenges
Blogspot
Automating REST Security Part 1: Challenges
Although REST has been a dominant choice for API design for the last decade, there is still little dedicated security research on the subjec...
hack and bug bounty
Shadow Attacks … the smallest attack vector ever
Blogspot
Shadow Attacks … the smallest attack vector ever
In July 2020, we introduced a novel attack class called Shadow Attacks . In our recent research, we discovered a new variant of the attack w...
hack and bug bounty
ALPACA: Application Layer Protocol Confusion-Analyzing and Mitigating Cracks in TLS Authentication
Blogspot
ALPACA: Application Layer Protocol Confusion-Analyzing and Mitigating Cracks in TLS Authentication
In cooperation with the university Paderborn and Münster University of Applied Sciences, we discovered a new flaw in the specification of TL...
hack and bug bounty
Security Analysis in an OpenID Connect Lab Environment
Blogspot
Security Analysis in an OpenID Connect Lab Environment
In this post, Christian Fries shows an approach to unveil security flaws in OpenID Connect Certified implementations with well-known attack...
hack and bug bounty
Why Receipt Notifications increase Security in Signal
Blogspot
Why Receipt Notifications increase Security in Signal
This blog post is aimed to express and explain my surprise about Signal being more secure than I thought (due to receipt acknowledgments). ...
hack and bug bounty
Scanning for Padding Oracles
Blogspot
Scanning for Padding Oracles
As you might have heard, we recently got our paper on padding oracle attacks accepted to the USENIX Security Conference. In this paper, we ...
hack and bug bounty
Playing with TLS-Attacker
Blogspot
Playing with TLS-Attacker
In the last two years, we changed the TLS-Attacker Project quite a lot but kept silent about most changes we implemented. Since we do not h...
hack and bug bounty
How To Spoof PDF Signatures
Blogspot
How To Spoof PDF Signatures
One year ago, we received a contract as a PDF file. It was digitally signed. We looked at the document - ignoring the "certificate is not tr...
hack and bug bounty
Practical Bleichenbacher Attacks on IPsec IKE
Blogspot
Practical Bleichenbacher Attacks on IPsec IKE
We found out that reusing a key pair across different versions and modes of IPsec IKE can lead to cross-protocol authentication bypasses, e...
hack and bug bounty
Practical Dictionary Attack on IPsec IKE
Blogspot
Practical Dictionary Attack on IPsec IKE
We found out that in contrast to public knowledge, the Pre-Shared Key (PSK) authentication method in main mode of IKEv1 is susceptible to o...
hack and bug bounty
Understanding SAST, DAST, and SCA: Essential Layers of Application Security
Medium
Understanding SAST, DAST, and SCA: Essential Layers of Application Security
SAST, DAST, and SCA are more known as shift left tools.
hack and bug bounty
Best Application Security Testing Companies
Medium
Best Application Security Testing Companies
Gartner defines the application security testing (AST) market as the buyers and sellers of products and services designed to analyze and…
hack and bug bounty
Teradata SQLi Cheatsheet
Medium
Teradata SQLi Cheatsheet
TD;LR This is a SQL Injection cheat sheet for the Teradata database. This is an initial version and not comprehensive enough yet.
hack and bug bounty
The Rise of AI Security Engineers
Medium
The Rise of AI Security Engineers
A few days ago at a conference, I asked a room full of engineers three simple questions:
hack and bug bounty
About OWASP Threat Dragon
Medium
About OWASP Threat Dragon
Strong threat modeling tools are more important than ever in the constantly changing field of cybersecurity. Tools like OWASP Threat Dragon…
hack and bug bounty
The Role Of Low-Code In AI Software Development
Medium
The Role Of Low-Code In AI Software Development
In the rapidly evolving landscape of technology, the integration of low-code development with artificial intelligence (AI) has ushered in a…