hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Hacking the “BetaFast” & “BetaBank” Thick Client Applications. Part — 2
Medium
Hacking the “BetaFast” & “BetaBank” Thick Client Applications. Part — 2
Now, it’s time to hack into the 2-tier application that is the “BetaBank” application. So, let’s get down to business………
hack and bug bounty
The Power of Reporting: How to write effective reports
Medium
The Power of Reporting: How to write effective reports
The bulwark of our digital ecosystem, Penetration Testing (pentesting), has the arduous task of staving off numerous cyber threats. An…
hack and bug bounty
this is me first blog
Medium
this is me first blog
bug
hack and bug bounty
All about Linux Permissions
Medium
All about Linux Permissions
Linux permissions are a critical aspect of the operating system’s security model. They control access to files and directories, determining…
hack and bug bounty
What is Reverse Shell Attack
Medium
What is Reverse Shell Attack
A reverse shell attack is a type of remote code execution in which an attacker establishes a connection from a compromised system to their…
hack and bug bounty
What are the benefits of penetration testing?
Medium
What are the benefits of penetration testing?
A penetration test (pen test) is an authorized simulated attack performed on a computer system to evaluate its security. Penetration…
hack and bug bounty
Wireshark Unleashed: Harnessing The Power of Packet Analysis
Medium
Wireshark Unleashed: Harnessing The Power of Packet Analysis
Wireshark is an essential tool for those in the info & cyber security field.
hack and bug bounty
If the only tool you have is a hammer… — Collaboration in Cybersecurity and bayond
Medium
If the only tool you have is a hammer… — Collaboration in Cybersecurity and bayond
If the hammer is the tool you are best with, I think you should use it as much as possible. I feel it would help collaboration
hack and bug bounty
VAmPI | Vulnerable API Penetration Testing
Medium
VAmPI | Vulnerable API Penetration Testing
1. Vulnerable API (VAmPI)
hack and bug bounty
Make Money By Hacking?? Bug Bounty Guide (Resources)
Medium
How To Bug Bounty in 2023 (Resources)
Hello Everyone, In this Blog we are going to discuss how to get started in Bug Bounty Hunting from scratch, although I am also a beginner I…
hack and bug bounty
What Is The Use Of Wireshark In Ethical Hacking?
Medium
What Is The Use Of Wireshark In Ethical Hacking?
What is Ethical Hacking
hack and bug bounty
Privilege Escalation — Playing with the various stages of a session state
Medium
Privilege Escalation — Playing with the various stages of a session state
A few months ago I came across an interesting find on a self-registration application in a Blackbox testing approach. As always, I will…
hack and bug bounty
Mastering the Realm of GraphQL Exploitation
Medium
Mastering the Realm of GraphQL Exploitation
Hey Infosec mates,
hack and bug bounty
Assessing Security Risks of Local Storage on Non-Jailbroken iOS Devices
Medium
Assessing Security Risks of Local Storage on Non-Jailbroken iOS Devices
Hello everyone, while doing iOS application penetration testing you may have come across a situation where you don’t have the jailbroken…
hack and bug bounty
Unlocking Potential: Exploring Frida & Objection on Non-Jailbroken Devices without Application…
Medium
Unlocking Potential: Exploring Frida & Objection on Non-Jailbroken Devices without Application…
As we saw in the previous article Assessing Security Risks of Local Storage on Non-Jailbroken iOS Devices that how we can install the…
hack and bug bounty
Authentication Technologies and Design Flaws in Authentication Mechanisms in Web Pentesting…
Medium
Authentication Technologies and Design Flaws in Authentication Mechanisms in Web Pentesting Applications — 14 | 2023
A Comprehensive Exploration of Web Application Authentication, Vulnerabilities, and Best Practices in Pentesting | Karthikeyan Nagaraj
hack and bug bounty
Abhieo Bug Bounty Program
Medium
Abhieo Bug Bounty Program
Welcome to Abhieo Android App Improvement Bug Bounty Program!
hack and bug bounty
Buy Stuffs for free — Exploiting Business Logic Vulnerabilities
Medium
Buy Stuffs for free — Exploiting Business Logic Vulnerabilities
Hi folks, hope ya’ll are doing great. In this blog, we’ll explore a simple technique to exploit business logic vulnerability in a website…
hack and bug bounty
HTB — Sense | 42/100
Medium
HTB — Sense | 42/100
Hi! Today I’m working on the machine Sense from HackTheBox. This box is one of the easier machines on the HTB platform, and is great for…
hack and bug bounty
Bug Bounty — Preparing for a Program
Medium
Bug Bounty — Preparing for a Program
This is a short post to sum up the information I have to get started on my first Bug Bounty program, How I prepare to not get in jail and…