hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Story Of Pre-Account Takeover via 0auth Misconfiguration
Medium
Story Of Pre-Account Takeover via 0auth Misconfiguration
Hello guys,
hack and bug bounty
Windows Security — SID (Security Identifier)
Medium
Windows Security — SID (Security Identifier)
The goal of an SID is to uniquely identify a security principal/group. When talking about a security principal we mean any entity that can…
hack and bug bounty
The OSI Model is a must in 2023
Medium
The OSI Model is a must in 2023
Knowing the OSI Model is no longer only for networking folks. In today’s interconnected world, it’s becoming essential knowledge for…
hack and bug bounty
Learn Cybersecurity with Minecraft and Docker: Part 1
Medium
Learn Cybersecurity with Minecraft and Docker: Part 1
“Imagination is the only weapon in the war with reality.”
hack and bug bounty
How to spoof your GPS to hide your location
Medium
How to spoof your GPS to hide your location
As you already know, it is possible to spoof both your IP address and MAC address. You can even spoof your global position (GPS). This is…
hack and bug bounty
Crack WPS Pin with Bully
Medium
Crack WPS Pin with Bully
Like all things in life, there are many ways to do a hack. In fact, good hackers usually have many tricks up their sleeve to break into a…
hack and bug bounty
How advertisers are tracking you and what you can do about it
Medium
How advertisers are tracking you and what you can do about it
There are a number of ways that advertisers can track you across the web. Advertisers cast a wide net and use many different techniques at…
hack and bug bounty
The basic features of cryptography
Medium
The basic features of cryptography
As hackers, we often face the hurdle of cryptography and encryption. Every security engineer understands that encryption makes an attacker’s job much more difficult. In some cases it can be useful to…
hack and bug bounty
What is a Brute Force attack and how to protect yourself
Medium
What is a Brute Force attack and how to protect yourself
There are many ways that hackers use to get into a computer, computer network, website, or online service.
hack and bug bounty
Malware analysis with Ghidra
Medium
Malware analysis with Ghidra
There are numerous tools that are free and available to security professionals to help analyze malware. The Ghidra was first released a few…
hack and bug bounty
What is the NIST Cybersecurity Framework
Medium
What is the NIST Cybersecurity Framework
The NIST Cybersecurity Framework is a continuously updated framework published by the National Institute of Standards and Technology and is a useful framework that organizations can design and follow…
hack and bug bounty
What is Traceroute and how to read the results of the process
Medium
What is Traceroute and how to read the results of the process
Every second, trillions of 1s and 0s pass through fiber optic links, move from continent to continent via undersea cables, and wirelessly bring users around the world the Internet we know and love…
hack and bug bounty
What is Open XDR and what are its benefits?
Medium
What is Open XDR and what are its benefits?
In an ever-changing cybersecurity environment, organizations must adapt their security in order to better secure themselves. As the…
hack and bug bounty
Sign In Modal Redesign: How to Mitigate the Confusion Caused by “Xs” on the former Twitter version
Medium
Sign In Modal Redesign: How to Mitigate the Confusion Caused by “Xs” on the former Twitter version
Twitter’s recent rebranding caused confusion with three “Xs” in the login modal. Learn UX strategies to improve clarity and user…
hack and bug bounty
Passive Reconnaissance — Networking{THM}
Medium
Passive Reconnaissance — Networking{THM}
Passive Reconnaissance (TRYHACKME)
hack and bug bounty
Findings in Swiggy’s Codebase: Memory Leak and Google Maps API Key Exposure.
Medium
Findings in Swiggy’s Codebase: Memory Leak and Google Maps API Key Exposure.
Greetings, Infosec aficionados! Today, we’re diving into the hilarious world of Swiggy’s tech oopsies, featuring not one but two delightful…
hack and bug bounty
Unraveling Web Application Vulnerabilities: My Journey to Discovering an HTML Injection Bug
Medium
Unraveling Web Application Vulnerabilities: My Journey to Discovering an HTML Injection Bug
Introduction: In the ever-evolving landscape of web application security, unearthing vulnerabilities becomes a pivotal pursuit for security…
hack and bug bounty
Bagaimana Caranya Menjadi Bug Bounty Hunter Sukses
Medium
Bagaimana Caranya Menjadi Bug Bounty Hunter Sukses
Untuk menjadi seorang Bug Bounty Hunter yang sukses, berikut adalah beberapa langkah yang dapat Anda ikuti:
hack and bug bounty
The Top In-Demand DevSecOps Skills: Insights from Hiring Managers and Security Experts
Medium
The Top In-Demand DevSecOps Skills: Insights from Hiring Managers and Security Experts
In today’s digital era, security has become a crucial concern for product development teams. The DevSecOps approach, which integrates…
hack and bug bounty
Now Upskill in Multiple Product Security Skills for Single Subscription
Medium
Now Upskill in Multiple Product Security Skills for Single Subscription
Product security is a crucial aspect of software development. Hence, IT and security professionals must have all the necessary skills to…