hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
HTTP Session and Session Hijacking
Medium
HTTP Session and Session Hijacking
First, Let’s discuss about HTTP sessions
hack and bug bounty
Encrypting Communications in Malware: A Dive into Windows API Functions with Python
Medium
Encrypting Communications in Malware: A Dive into Windows API Functions with Python
This article uses Python and ctypes to illustrate the Windows API functions, but in real-world scenarios, malware is often written in…
hack and bug bounty
How to Secure the Expanding Attack Surface with Application Security Testing (AST)
Medium
How to Secure the Expanding Attack Surface with Application Security Testing (AST)
Cloud, IoT Devices, APIs, Web Apps, BYOD, Remote Work, Supply Chain, and Third Party Vendors
hack and bug bounty
Redacted usernames disclosure in "Export as .pdf" feature
Medium
Redacted usernames disclosure in "Export as .pdf" feature
Severity: Low (3.4)
Weakness: Sensitive Information Disclosure
Bounty: $500
hack and bug bounty
How to exploit SQL Injection to RCE using SQLMAP
Medium
How to exploit SQL Injection to RCE using SQLMAP
It was first time in my cyber security career, I have discovered this critical vulnerability back in 2019, I thought of posting it in…
hack and bug bounty
Design Flaws in Authentication in Web Applications Pentesting — 15 | 2023
Medium
Design Flaws in Authentication in Web Applications Pentesting — 15 | 2023
Understanding Vulnerabilities and Best Practices to Strengthen Web Application Authentication | Karthikeyan Nagaraj
hack and bug bounty
Cyber Briefing: 2023.08.07
Medium
Cyber Briefing: 2023.08.07
👉
What’s happening in cybersecurity today? hVNC Malware, MacOS, Apple, Reptile Rootkit, South Korea, Microsoft Power Platform, Team R70…
hack and bug bounty
X: The Twitter Rebrand (Xplained)
Medium
X: The Twitter Rebrand (Xplained)
On July 24, 2023, Monday, Twitter killed the Blue Bird to officially become X, with a new logo inspired by Unicode. Elon Musk fans say this…
hack and bug bounty
Cyber Security Audits: Everything You Need to Know
Medium
Cyber Security Audits: Everything You Need to Know
Regular, comprehensive cyber security audits are critical for managing escalating risks in today’s digital landscape. This in-depth guide…
hack and bug bounty
QUICK GUIDE — Malware Analysis and Ethical Hacking Links to Tools, Training, and Certifications
Medium
QUICK GUIDE — Malware Analysis and Ethical Hacking Links to Tools, Training, and Certifications
Malware Analysis and Ethical Hacking | Tools, Resources, and Training
hack and bug bounty
HTB — SolidState | 43/100
Medium
HTB — SolidState | 43/100
Howdy! Today I’m working on SolidState from HackTheBox. This was a really fun box that involved guessing weak credentials for a James…
hack and bug bounty
In the Making
Medium
In the Making
Twitter’s era has ended, welcome to the age of X.
hack and bug bounty
Cracking the Code: The Unseen Secrets of the App Sec Vulnerability Management Lifecycle!
Medium
Cracking the Code: The Unseen Secrets of the App Sec Vulnerability Management Lifecycle!
Application Security Vulnerabilities can be introduced in many ways into your application. How do you know where they are , and how can…
hack and bug bounty
Attacking Misconfigure Spring Boot Actuators
Medium
Attacking Misconfigure Spring Boot Actuators
In this story I’ll write about spring boot actuators. I’ll explain the components and we will see Hackerone reports about it. It’s very…
hack and bug bounty
HackTheBox Writeup — Delivery
Medium
HackTheBox Writeup — Delivery
Step1 : Enumeration
hack and bug bounty
PII-nacles of Discovery: Deep Recon, Fourth-Level Subdomains, and Abusing Exposed .git Repositories
Medium
PII-nacles of Discovery: Deep Recon, Fourth-Level Subdomains, and Abusing Exposed .git Repositories
“All your Git repos are belong to us.”
hack and bug bounty
Username Aliasing and Draft Synchronization On X(fka Twitter)
Medium
Username Aliasing and Draft Synchronization On X(fka Twitter)
New feature requests; synchronization feature on draft (desktop <->phones) and username redirection within posts (old — new user…
hack and bug bounty
Burp Suite in Action: Real-Life Examples of Web Application Security Testing
Medium
Burp Suite in Action: Real-Life Examples of Web Application Security Testing
Web application security is of utmost importance in today’s digital landscape. As businesses rely heavily on web applications to deliver…
hack and bug bounty
THM — Pickle Rick | 44/100
Medium
THM — Pickle Rick | 44/100
Hi! Here is CTF writeup 44 out of a planned 100, Pickle Rick from TryHackMe. This was a really fun and very beginner friendly box. This…
hack and bug bounty
HackTheBox “OpenAdmin” Walkthrough
Medium
HackTheBox “OpenAdmin” Walkthrough
OpenAdmin, an easy-level Linux OS machine on HackTheBox, involves conducting some enumeration to uncover an instance of OpenNetAdmin…