hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Top Security Practices in Our Software Development Process
Medium
Top Security Practices in Our Software Development Process
In an increasingly digitised world, securing your software applications is not merely an option — it’s a necessity. With cyber threats…
hack and bug bounty
Install Kali Linux di Mac M1/M2 via UTM
Medium
Install Kali Linux di Mac M1/M2 via UTM
Jika Anda adalah pengguna Mac M1 yang ingin menjalankan sistem operasi Kali Linux dalam lingkungan virtual, UTM (Universal Task Manager)…
hack and bug bounty
The Fine Line: Navigating the Ethics of Cybersecurity in an Era of Privacy vs. Security
Medium
The Fine Line: Navigating the Ethics of Cybersecurity in an Era of Privacy vs. Security
Cybersecurity is a critical issue in today’s world, as organizations and individuals face increasingly sophisticated and persistent cyber…
hack and bug bounty
HTTP Session and Session Hijacking
Medium
HTTP Session and Session Hijacking
First, Let’s discuss about HTTP sessions
hack and bug bounty
Encrypting Communications in Malware: A Dive into Windows API Functions with Python
Medium
Encrypting Communications in Malware: A Dive into Windows API Functions with Python
This article uses Python and ctypes to illustrate the Windows API functions, but in real-world scenarios, malware is often written in…
hack and bug bounty
How to Secure the Expanding Attack Surface with Application Security Testing (AST)
Medium
How to Secure the Expanding Attack Surface with Application Security Testing (AST)
Cloud, IoT Devices, APIs, Web Apps, BYOD, Remote Work, Supply Chain, and Third Party Vendors
hack and bug bounty
Redacted usernames disclosure in "Export as .pdf" feature
Medium
Redacted usernames disclosure in "Export as .pdf" feature
Severity: Low (3.4)
Weakness: Sensitive Information Disclosure
Bounty: $500
hack and bug bounty
How to exploit SQL Injection to RCE using SQLMAP
Medium
How to exploit SQL Injection to RCE using SQLMAP
It was first time in my cyber security career, I have discovered this critical vulnerability back in 2019, I thought of posting it in…
hack and bug bounty
Design Flaws in Authentication in Web Applications Pentesting — 15 | 2023
Medium
Design Flaws in Authentication in Web Applications Pentesting — 15 | 2023
Understanding Vulnerabilities and Best Practices to Strengthen Web Application Authentication | Karthikeyan Nagaraj
hack and bug bounty
Cyber Briefing: 2023.08.07
Medium
Cyber Briefing: 2023.08.07
👉
What’s happening in cybersecurity today? hVNC Malware, MacOS, Apple, Reptile Rootkit, South Korea, Microsoft Power Platform, Team R70…
hack and bug bounty
X: The Twitter Rebrand (Xplained)
Medium
X: The Twitter Rebrand (Xplained)
On July 24, 2023, Monday, Twitter killed the Blue Bird to officially become X, with a new logo inspired by Unicode. Elon Musk fans say this…
hack and bug bounty
Cyber Security Audits: Everything You Need to Know
Medium
Cyber Security Audits: Everything You Need to Know
Regular, comprehensive cyber security audits are critical for managing escalating risks in today’s digital landscape. This in-depth guide…
hack and bug bounty
QUICK GUIDE — Malware Analysis and Ethical Hacking Links to Tools, Training, and Certifications
Medium
QUICK GUIDE — Malware Analysis and Ethical Hacking Links to Tools, Training, and Certifications
Malware Analysis and Ethical Hacking | Tools, Resources, and Training
hack and bug bounty
HTB — SolidState | 43/100
Medium
HTB — SolidState | 43/100
Howdy! Today I’m working on SolidState from HackTheBox. This was a really fun box that involved guessing weak credentials for a James…
hack and bug bounty
In the Making
Medium
In the Making
Twitter’s era has ended, welcome to the age of X.
hack and bug bounty
Cracking the Code: The Unseen Secrets of the App Sec Vulnerability Management Lifecycle!
Medium
Cracking the Code: The Unseen Secrets of the App Sec Vulnerability Management Lifecycle!
Application Security Vulnerabilities can be introduced in many ways into your application. How do you know where they are , and how can…
hack and bug bounty
Attacking Misconfigure Spring Boot Actuators
Medium
Attacking Misconfigure Spring Boot Actuators
In this story I’ll write about spring boot actuators. I’ll explain the components and we will see Hackerone reports about it. It’s very…
hack and bug bounty
HackTheBox Writeup — Delivery
Medium
HackTheBox Writeup — Delivery
Step1 : Enumeration
hack and bug bounty
PII-nacles of Discovery: Deep Recon, Fourth-Level Subdomains, and Abusing Exposed .git Repositories
Medium
PII-nacles of Discovery: Deep Recon, Fourth-Level Subdomains, and Abusing Exposed .git Repositories
“All your Git repos are belong to us.”
hack and bug bounty
Username Aliasing and Draft Synchronization On X(fka Twitter)
Medium
Username Aliasing and Draft Synchronization On X(fka Twitter)
New feature requests; synchronization feature on draft (desktop <->phones) and username redirection within posts (old — new user…