hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Android security: Everything you need to know
Medium
Android security: Everything you need to know
Although mobile users are slowly seeing their choice of operating systems expand, Android and iOS still hold the lion’s share of the market…
hack and bug bounty
DNS Hacking: Local network redirect to our page
Medium
DNS Hacking: Local network redirect to our page
In this guide, we will take advantage of Domain Name Service (DNS). As you know, DNS is used to resolve domain names or convert a domain…
hack and bug bounty
Compromise mobile communications via Unisoc vulnerability
Medium
Compromise mobile communications via Unisoc vulnerability
Chinese company UNISOC, founded as Spreadtrum, is one of the largest chipmakers in the world and the largest in China for the past 20…
hack and bug bounty
Getting a Pentesting Job Without Spending a Dollar
Medium
Getting a Pentesting Job Without Spending a Dollar
In light of recent debates and scandals about cybersecurity education and job search, I want to provide my own views and insights
hack and bug bounty
Top Security Practices in Our Software Development Process
Medium
Top Security Practices in Our Software Development Process
In an increasingly digitised world, securing your software applications is not merely an option — it’s a necessity. With cyber threats…
hack and bug bounty
Install Kali Linux di Mac M1/M2 via UTM
Medium
Install Kali Linux di Mac M1/M2 via UTM
Jika Anda adalah pengguna Mac M1 yang ingin menjalankan sistem operasi Kali Linux dalam lingkungan virtual, UTM (Universal Task Manager)…
hack and bug bounty
The Fine Line: Navigating the Ethics of Cybersecurity in an Era of Privacy vs. Security
Medium
The Fine Line: Navigating the Ethics of Cybersecurity in an Era of Privacy vs. Security
Cybersecurity is a critical issue in today’s world, as organizations and individuals face increasingly sophisticated and persistent cyber…
hack and bug bounty
HTTP Session and Session Hijacking
Medium
HTTP Session and Session Hijacking
First, Let’s discuss about HTTP sessions
hack and bug bounty
Encrypting Communications in Malware: A Dive into Windows API Functions with Python
Medium
Encrypting Communications in Malware: A Dive into Windows API Functions with Python
This article uses Python and ctypes to illustrate the Windows API functions, but in real-world scenarios, malware is often written in…
hack and bug bounty
How to Secure the Expanding Attack Surface with Application Security Testing (AST)
Medium
How to Secure the Expanding Attack Surface with Application Security Testing (AST)
Cloud, IoT Devices, APIs, Web Apps, BYOD, Remote Work, Supply Chain, and Third Party Vendors
hack and bug bounty
Redacted usernames disclosure in "Export as .pdf" feature
Medium
Redacted usernames disclosure in "Export as .pdf" feature
Severity: Low (3.4)
Weakness: Sensitive Information Disclosure
Bounty: $500
hack and bug bounty
How to exploit SQL Injection to RCE using SQLMAP
Medium
How to exploit SQL Injection to RCE using SQLMAP
It was first time in my cyber security career, I have discovered this critical vulnerability back in 2019, I thought of posting it in…
hack and bug bounty
Design Flaws in Authentication in Web Applications Pentesting — 15 | 2023
Medium
Design Flaws in Authentication in Web Applications Pentesting — 15 | 2023
Understanding Vulnerabilities and Best Practices to Strengthen Web Application Authentication | Karthikeyan Nagaraj
hack and bug bounty
Cyber Briefing: 2023.08.07
Medium
Cyber Briefing: 2023.08.07
👉
What’s happening in cybersecurity today? hVNC Malware, MacOS, Apple, Reptile Rootkit, South Korea, Microsoft Power Platform, Team R70…
hack and bug bounty
X: The Twitter Rebrand (Xplained)
Medium
X: The Twitter Rebrand (Xplained)
On July 24, 2023, Monday, Twitter killed the Blue Bird to officially become X, with a new logo inspired by Unicode. Elon Musk fans say this…
hack and bug bounty
Cyber Security Audits: Everything You Need to Know
Medium
Cyber Security Audits: Everything You Need to Know
Regular, comprehensive cyber security audits are critical for managing escalating risks in today’s digital landscape. This in-depth guide…
hack and bug bounty
QUICK GUIDE — Malware Analysis and Ethical Hacking Links to Tools, Training, and Certifications
Medium
QUICK GUIDE — Malware Analysis and Ethical Hacking Links to Tools, Training, and Certifications
Malware Analysis and Ethical Hacking | Tools, Resources, and Training
hack and bug bounty
HTB — SolidState | 43/100
Medium
HTB — SolidState | 43/100
Howdy! Today I’m working on SolidState from HackTheBox. This was a really fun box that involved guessing weak credentials for a James…
hack and bug bounty
In the Making
Medium
In the Making
Twitter’s era has ended, welcome to the age of X.
hack and bug bounty
Cracking the Code: The Unseen Secrets of the App Sec Vulnerability Management Lifecycle!
Medium
Cracking the Code: The Unseen Secrets of the App Sec Vulnerability Management Lifecycle!
Application Security Vulnerabilities can be introduced in many ways into your application. How do you know where they are , and how can…