hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
HackTheBox “Mango” Walkthrough
Medium
HackTheBox “Mango” Walkthrough
Mango, a medium-level Linux OS machine on HackTheBox, centers around the exploitation of a NoSQL document database to circumvent an…
hack and bug bounty
Uncovering React Code with Source Maps
Medium
Uncovering React Code with Source Maps
React has gained immense popularity as a powerful JavaScript library, offering developers the tools to build dynamic and efficient user…
hack and bug bounty
Privilege Escalation with IAM Service on Amazon AWS Systems Through an Example
Medium
Privilege Escalation with IAM Service on Amazon AWS Systems Through an Example
Amazon Web Services (AWS) cloud platform has become the backbone of countless modern applications, providing scalable and reliable…
hack and bug bounty
Mastering Small Scope Programs: A Comprehensive Guide for Bug Hunting
Medium
Mastering Small Scope Programs: A Comprehensive Guide for Bug Hunting
Hi there, I hope you all are doing well. This is my 4th writeup here and today i will be discussing how to approach small scope programs…
hack and bug bounty
What is Pentesting?
Medium
What is Pentesting?
Penetration testing / pen testing or ethical hacking
hack and bug bounty
Fringe
Medium
Fringe
I listened to Joe Rogan and Marc Andreessen’s two-hour convo.
hack and bug bounty
ARMed for x86: How to run and compile x86 executables on Kali ARM
Medium
ARMed for x86: How to run and compile x86 executables on Kali ARM
I’m gonna keep it real with you here, the ARM-based Macbook was and is a game changer when it comes to laptops. The battery life is…
hack and bug bounty
HTB Legacy Walkthrough w/ Metasploit
Medium
HTB Legacy Walkthrough w/ Metasploit
nmap -A 10.129.173.183
hack and bug bounty
HackTheBox “Traverxec” Walkthrough
Medium
HackTheBox “Traverxec” Walkthrough
Traverxec, an easy-level Linux OS machine on HackTheBox, necessitating thorough enumeration and exploitation of the web server, Nostromo…
hack and bug bounty
$1000 for a simple Stored XSS
Medium
$1000 for a simple Stored XSS
I was hacking on a private program and I couldn't get anything interesting by fuzzing or using the website’s features.
hack and bug bounty
HTB Blue Walkthrough w/ Metasploit
Medium
HTB Blue Walkthrough w/ Metasploit
nmap -A 10.129.184.242
hack and bug bounty
LolBin with InstallUtil.exe: LolBin to Command Execution
Medium
LolBin with InstallUtil.exe: LolBin to Command Execution
It’s normal to see default binaries allowed into an AppLocker rule but you can’t execute any command into the machine so you can abuse…
hack and bug bounty
Leak of Sensitive Information: An Attacker Can Recover Every User’s Mobile Numbers
Medium
Leak of Sensitive Information: An Attacker Can Recover Every User’s Mobile Numbers
The data of all joined users can be retrieved by an attacker.
hack and bug bounty
Why Ethical Hackers?
Medium
Why Ethical Hackers?
“Cybercrime is the greatest threat to every company in the world.”
hack and bug bounty
Types of hackers
Medium
Types of hackers
🔻
𝗪𝗵𝗶𝘁𝗲 𝗵𝗮𝘁 𝗛𝗮𝗰𝗸𝗲𝗿
🔻
hack and bug bounty
What is CIA Triad?
Medium
What is CIA Triad?
Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security…
hack and bug bounty
HTB Optimum Walkthrough w/ Metasploit
Medium
HTB Optimum Walkthrough w/ Metasploit
nmap -A 10.129.138.23
hack and bug bounty
HTB Devel Walkthrough w/ Metasploit
Medium
HTB Devel Walkthrough w/ Metasploit
nmap -A 10.129.154.254
hack and bug bounty
HTB Lame Walkthrough w/ Metasploit
Medium
HTB Lame Walkthrough w/ Metasploit
nmap 10.129.138.127
hack and bug bounty
HTB Granny/Grandpa Walkthrough w/ Metasploit
Medium
HTB Granny/Grandpa Walkthrough w/ Metasploit
nmap -A 10.129.95.234