hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Practical Bleichenbacher Attacks on IPsec IKE
Blogspot
Practical Bleichenbacher Attacks on IPsec IKE
We found out that reusing a key pair across different versions and modes of IPsec IKE can lead to cross-protocol authentication bypasses, e...
hack and bug bounty
Practical Dictionary Attack on IPsec IKE
Blogspot
Practical Dictionary Attack on IPsec IKE
We found out that in contrast to public knowledge, the Pre-Shared Key (PSK) authentication method in main mode of IKEv1 is susceptible to o...
hack and bug bounty
Understanding SAST, DAST, and SCA: Essential Layers of Application Security
Medium
Understanding SAST, DAST, and SCA: Essential Layers of Application Security
SAST, DAST, and SCA are more known as shift left tools.
hack and bug bounty
Best Application Security Testing Companies
Medium
Best Application Security Testing Companies
Gartner defines the application security testing (AST) market as the buyers and sellers of products and services designed to analyze and…
hack and bug bounty
Teradata SQLi Cheatsheet
Medium
Teradata SQLi Cheatsheet
TD;LR This is a SQL Injection cheat sheet for the Teradata database. This is an initial version and not comprehensive enough yet.
hack and bug bounty
The Rise of AI Security Engineers
Medium
The Rise of AI Security Engineers
A few days ago at a conference, I asked a room full of engineers three simple questions:
hack and bug bounty
About OWASP Threat Dragon
Medium
About OWASP Threat Dragon
Strong threat modeling tools are more important than ever in the constantly changing field of cybersecurity. Tools like OWASP Threat Dragon…
hack and bug bounty
The Role Of Low-Code In AI Software Development
Medium
The Role Of Low-Code In AI Software Development
In the rapidly evolving landscape of technology, the integration of low-code development with artificial intelligence (AI) has ushered in a…
hack and bug bounty
Mastering Application Security: Fundamental Strategies to Advanced Techniques (Module 2.1)
Medium
Mastering Application Security: Fundamental Strategies to Advanced Techniques (Module 2.1)
Explore AppSec from basics to advanced in our guide, ensuring robust application security.
hack and bug bounty
✨
Introduction to Application Security Testing
Medium
✨
Introduction to Application Security Testing
🔐
Wth is Application Security Testing??
hack and bug bounty
API Security Checklist
Medium
API Security Checklist
OWASP Top 10 for API Security
hack and bug bounty
JWT Explained in Depth | CyberSecurityTv
Medium
JWT Explained in Depth | CyberSecurityTv
JWT is a common form of method to maintain user sessions as well as authorize the users. It is essential to learn how JWT are formed and…
hack and bug bounty
Clickjacking: A Comprehensive Guide to Finding Clickjacking Vulnerabilities
Medium
Clickjacking: A Comprehensive Guide to Finding Clickjacking Vulnerabilities
In this section we will explain what clickjacking is, describe common examples of clickjacking attacks and discuss how to protect against…
hack and bug bounty
Vulnerable WordPress March 2024 (Kandovan)
Medium
Vulnerable WordPress March 2024 (Kandovan)
Github Repo: https://github.com/onhexgroup/Vulnerable-WordPress
hack and bug bounty
SQL Injection: A Simple Beginner’s Guide.
Medium
SQL Injection: A Simple Beginner’s Guide.
Introduction
hack and bug bounty
Privilege Escalation by manipulating endpoint
Medium
Privilege Escalation by manipulating endpoint
Hello Jai Sia Ram Dosto,
Here is my first blog.
I have found the Privilege Escalation during pen-testing.
Sometime we have to focus on…
hack and bug bounty
Google Bug Hunters
Medium
Google Bug Hunters
In the realm of cybersecurity, where threats lurk around every virtual corner, organizations must deploy formidable defenses to safeguard…
hack and bug bounty
hello
Medium
hello
I need help finding a hidden channel on discord but how do I find it??? without application or website.. just with the inspector and…
hack and bug bounty
IDOR to make comment in user’s private posts
Medium
IDOR to make comment in user’s private posts
Hello hackers, today i will show you how i can make comments in any user’s private post with IDOR.
hack and bug bounty
Easy Money from the Most Trivially Easy Broken Access Control
Medium
Easy Money from the Most Trivially Easy Broken Access Control
Hello, I am Abda11aTarek. Some of my friends asks me about how I achieved a listing in the Top 10 on Bugcrowd’s leaderboard for P1 and P2…
hack and bug bounty
How To Find Orgin IP
Medium
How To Find Orgin IP
Hi, Today is We learn how to find Orgin IP.