hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Find hidden directories with Dirb
Medium
Find hidden directories with Dirb
Often, in order to hack a website, we need to connect and exploit an object. This can be an administrative panel or a subdirectory that is vulnerable to attacks. The key, of course, is to find these…
hack and bug bounty
Finding evidence in forensics
Medium
Finding evidence in forensics
In previous articles in this series, we created a forensic image of the attacker’s hard drive and RAM and used Autopsy to recover deleted…
hack and bug bounty
SCADA Hacking: Modbus Master/Slave Simulation
Medium
SCADA Hacking: Modbus Master/Slave Simulation
The systems SCADA/ICS they use many different communication protocols than standard IT systems. The most widely used and de facto standard…
hack and bug bounty
SCADA Hacking: Monitoring Tests of SCADA HoneyPot
Medium
SCADA Hacking: Monitoring Tests of SCADA HoneyPot
In the previous article in the SCADA Hacking series, we built a sophisticated, low-interaction SCADA honeypot with the conpot.
hack and bug bounty
8 Cases of Vishing and How to Avoid Them
Medium
8 Cases of Vishing and How to Avoid Them
More it looks like with fraud than with threat to her better safety at cyberspace, vishing is known as a effort theft of information or…
hack and bug bounty
Autopsy Digital Forensics: Recover Deleted Files
Medium
Autopsy Digital Forensics: Recover Deleted Files
Autopsy: As you know, files that are “deleted” remain on the storage medium until they are replaced. Deleting these files simply makes the…
hack and bug bounty
SCADA Hacking: Creating a SCADA Honeypot
Medium
SCADA Hacking: Creating a SCADA Honeypot
In this guide, we will create a SCADA/ICS Honeypot. As you know, a honeypot is a computer system that looks and acts like a vulnerable…
hack and bug bounty
Collection of Metadata from websites with FOCA
Medium
Collection of Metadata from websites with FOCA
FOCA was launched in 2009 and is now in its third edition. Although a Linux version is included with Kali, it is quite old. Let’s download…
hack and bug bounty
Bypassing uncomfortably easy CAPTCHAs in my free time
Medium
Bypassing uncomfortably easy CAPTCHAs in my free time
One day at night, I was going through my recon data for multiple bug bounty targets but not really having the energy to do the usual…
hack and bug bounty
UK International Data Transfer Agreement
Medium
UK International Data Transfer Agreement
On February 2, 2022, the Information Commissioner’s Office (ICO) introduced changes regarding restricted international personal data…
hack and bug bounty
LibreWolf vs Firefox: A Comprehensive Comparison of Privacy-Focused Browsers
Medium
LibreWolf vs Firefox: A Comprehensive Comparison of Privacy-Focused Browsers
“LibreWolf vs Firefox: A Comprehensive Comparison of Privacy-Focused Browsers” is published by SimeonOnSecurity.
hack and bug bounty
The Best Homelab Hardware: Building a Powerful and Budget-Friendly Setup
Medium
The Best Homelab Hardware: Building a Powerful and Budget-Friendly Setup
Sufficient RAM is crucial for smooth operations in your homelab. It allows you to run multiple applications simultaneously and ensures optimal performance. Here are some recommendations for RAM…
hack and bug bounty
How to Start a Career in Cybersecurity: Coding Skills and Beyond
Medium
How to Start a Career in Cybersecurity: Coding Skills and Beyond
Conversely, for those drawn to technical challenges involving coding and programming, a multitude of opportunities beckon. These roles demand a profound grasp of programming languages and the acumen…
hack and bug bounty
Mastering Advanced Windows CMD Scripting for Enhanced Efficiency
Medium
Mastering Advanced Windows CMD Scripting for Enhanced Efficiency
“Mastering Advanced Windows CMD Scripting for Enhanced Efficiency” is published by SimeonOnSecurity.
hack and bug bounty
Securing Vulnerable Groups: Cyber Threats and Protection Strategies
Medium
Securing Vulnerable Groups: Cyber Threats and Protection Strategies
The data accessed by foreign powers can be used for insidious surveillance operations. They may monitor the actions and interactions of vulnerable individuals, creating an atmosphere of constant…
hack and bug bounty
Empowering Privacy: Understanding the CCPA and Your Rights
Medium
Empowering Privacy: Understanding the CCPA and Your Rights
“Empowering Privacy: Understanding the CCPA and Your Rights” is published by SimeonOnSecurity.
hack and bug bounty
Defending Data: PCI-DSS Explained for Secure Card Transactions
Medium
Defending Data: PCI-DSS Explained for Secure Card Transactions
“Defending Data: PCI-DSS Explained for Secure Card Transactions” is published by SimeonOnSecurity.
hack and bug bounty
Demystifying GDPR: Your Guide to Data Privacy Regulations
Medium
Demystifying GDPR: Your Guide to Data Privacy Regulations
“Demystifying GDPR: Your Guide to Data Privacy Regulations” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Cybersecurity: Exploring the Vital Risk Management Framework
Medium
Mastering Cybersecurity: Exploring the Vital Risk Management Framework
“Mastering Cybersecurity: Exploring the Vital Risk Management Framework” is published by SimeonOnSecurity.
hack and bug bounty
FISMA: Enhancing Federal Cybersecurity for Safer Data
Medium
FISMA: Enhancing Federal Cybersecurity for Safer Data
“FISMA: Enhancing Federal Cybersecurity for Safer Data” is published by SimeonOnSecurity.