hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Bypassing XSS Filters: Techniques and Solutions
Medium
Bypassing XSS Filters: Techniques and Solutions
In the ever-evolving landscape of web security, Cross-Site Scripting (XSS) stands as one of the most pernicious vulnerabilities. XSS allows…
hack and bug bounty
What is Bash Shell Scripting?
Medium
What is Bash Shell Scripting?
Shell scripting is a versatile tool.
hack and bug bounty
New techniques and tools for web race conditions
PortSwigger Blog
New techniques and tools for web race conditions
For too long, web race-condition attacks have focused on a tiny handful of scenarios. Testing for them is inherently unreliable, compounded by known challenges relating to time constraints and network
hack and bug bounty
How to Setup Windows 10 VM Lab for Hacking
Medium
How to Setup Windows 10 VM Lab for Hacking
I always love the saying:
hack and bug bounty
Understanding the Benefits of Using BlackArch Linux for Penetration Testing: This blog post…
Medium
Understanding the Benefits of Using BlackArch Linux for Penetration Testing: This blog post…
Introduction
hack and bug bounty
How to Setup (Vulnerable) Windows 10 VM Lab for Hacking
Medium
How to Setup Windows 10 VM Lab for Hacking
I always love the saying:
hack and bug bounty
De Twitter a Mastodon
Medium
De Twitter a Mastodon
De las personas que me leéis aquí, ¿estáis alguna en Mastodon?
hack and bug bounty
Power of One-Liners: Master Bug Bounty Automation:
Medium
🔍
Power of One-Liners: Master Bug Bounty Automation:
🔍
🚀
Supercharge Your Bug Hunting with Brilliant One-Liners and Crush Vulnerabilities!
🚀
hack and bug bounty
Safeguarding the Digital Present: The Vital Importance of Cybersecurity
Medium
Safeguarding the Digital Present: The Vital Importance of Cybersecurity
In the ever-evolving landscape of the modern Internet age, the importance of cybersecurity cannot be overstated. As our lives become…
hack and bug bounty
Zero to OSCP 2023: it isn’t as tough as you think
Medium
Zero to OSCP 2023: it isn’t as tough as you think
Introduction
hack and bug bounty
Finding vulnerable systems on the Internet with Netlas.io
Medium
Finding vulnerable systems on the Internet with Netlas.io
Often, as cyber warriors, we need to check whether our systems or the systems of others are vulnerable to various known vulnerabilities and…
hack and bug bounty
Find parameters silently with ParamSpider
Medium
Find parameters silently with ParamSpider
When trying to hack a website, it can be extremely useful to get the parameters of various pages. These may include php, woff, css, js, png, svg, php, jpg and more. Each of these parameters can…
hack and bug bounty
Find hidden directories with Dirb
Medium
Find hidden directories with Dirb
Often, in order to hack a website, we need to connect and exploit an object. This can be an administrative panel or a subdirectory that is vulnerable to attacks. The key, of course, is to find these…
hack and bug bounty
Finding evidence in forensics
Medium
Finding evidence in forensics
In previous articles in this series, we created a forensic image of the attacker’s hard drive and RAM and used Autopsy to recover deleted…
hack and bug bounty
SCADA Hacking: Modbus Master/Slave Simulation
Medium
SCADA Hacking: Modbus Master/Slave Simulation
The systems SCADA/ICS they use many different communication protocols than standard IT systems. The most widely used and de facto standard…
hack and bug bounty
SCADA Hacking: Monitoring Tests of SCADA HoneyPot
Medium
SCADA Hacking: Monitoring Tests of SCADA HoneyPot
In the previous article in the SCADA Hacking series, we built a sophisticated, low-interaction SCADA honeypot with the conpot.
hack and bug bounty
8 Cases of Vishing and How to Avoid Them
Medium
8 Cases of Vishing and How to Avoid Them
More it looks like with fraud than with threat to her better safety at cyberspace, vishing is known as a effort theft of information or…
hack and bug bounty
Autopsy Digital Forensics: Recover Deleted Files
Medium
Autopsy Digital Forensics: Recover Deleted Files
Autopsy: As you know, files that are “deleted” remain on the storage medium until they are replaced. Deleting these files simply makes the…
hack and bug bounty
SCADA Hacking: Creating a SCADA Honeypot
Medium
SCADA Hacking: Creating a SCADA Honeypot
In this guide, we will create a SCADA/ICS Honeypot. As you know, a honeypot is a computer system that looks and acts like a vulnerable…
hack and bug bounty
Collection of Metadata from websites with FOCA
Medium
Collection of Metadata from websites with FOCA
FOCA was launched in 2009 and is now in its third edition. Although a Linux version is included with Kali, it is quite old. Let’s download…