hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
The Ultimate Guide to the Top 15+ Ethical Hacking Certifications for a Thriving 2023 Career
Medium
The Ultimate Guide to the Top 15+ Ethical Hacking Certifications for a Thriving 2023 Career
Finding weaknesses in a computer system or network and taking action to close them is known as ethical hacking.
hack and bug bounty
Uncovering Hidden Likes through Parameter Manipulation
Medium
Uncovering Hidden Likes through Parameter Manipulation
Hello everyone, welcome back to yet another blog. Thank you so much for showing your love in my previous post. Without any further delay…
hack and bug bounty
“Securing My Path: A Year of B.Tech and Cybersecurity Triumphs"
Medium
“Securing My Path: A Year of B.Tech and Cybersecurity Triumphs"
Hey, I’m Abhishek Dirisipo.
hack and bug bounty
Introducing Goctopus: Open-Source GraphQL endpoint discovery tool written in go
Medium
Introducing Goctopus: Open-Source GraphQL endpoint discovery tool written in go
In the fast-evolving domain of APIs, GraphQL has emerged as a powerful, data-oriented language. As its adoption soars, so does the need for…
hack and bug bounty
Securing the University by failure of invalidating of session
Medium
Securing the University by failure of invalidating of session
Tale of securing the university of united states.
hack and bug bounty
Bug Bounty Course For Begineers
Medium
Bug Bounty Course For Begineers
Are you ready to step into the exciting world of ethical hacking and web security? Look no further! Join our globally renowned…
hack and bug bounty
Site Takeover via SCCM’s AdminService API
Medium
Site Takeover via SCCM’s AdminService API
tl:dr: The SCCM AdminService API is vulnerable to NTLM relaying and can be abused for SCCM site takeover.
hack and bug bounty
Join GuidedHacking Today
Medium
Join GuidedHacking Today
Learning Penetration Testing
hack and bug bounty
Exploring Burp Suite’s Features: A Detailed Overview
Medium
Exploring Burp Suite’s Features: A Detailed Overview
In the field of web application security testing, Burp Suite has established itself as a powerful and widely-used tool. Whether you are a…
hack and bug bounty
CSRF in OAuth flow of a private program.
Medium
CSRF in OAuth flow of a private program.
Hello friend, This writeup is about a simple CSRF in a function that’s using OAuth to attach third-party accounts to the user’s dashboard.
hack and bug bounty
Account takeover of any user through password reset functionality.
Medium
Account takeover of any user through password reset functionality.
Hello Everyone,
hack and bug bounty
EC-Council CEH Practical / Master 準備心得-讓理論與實作相輔相成的學習
Medium
EC-Council CEH Practical / Master 準備心得 — 讓理論與實作相輔相成的學習
CEH Practical 是需要在 6 小時內完成 20 題實作考試的入門級實戰證照,很適合資安管理人員了解一些攻擊原理,畢竟管理人也絕對是需要懂防守與攻擊技術概念。早期的 CEH 考試沒有實作,而現在 CEH Practical…
hack and bug bounty
Mastering the Basics: Bandit Wargame Level 0 Walkthrough
Medium
Mastering the Basics: Bandit Wargame Level 0 Walkthrough
Introduction:
hack and bug bounty
Aleo FireSide Newspaper #24 (English)
Medium
Aleo FireSide Newspaper #24 (English)
The publication was prepared by: Gena | GG, rykovka, RoyHansen, AnnaB, Rufat, Sula and the_liolik
hack and bug bounty
Aleo FireSide Newspaper #24 (Ukrainian)
Medium
Aleo FireSide Newspaper #24 (Ukrainian)
Випуск підготували: Gena | GG, rykovka, RoyHansen, AnnaB, Rufat Sula і the_liolik
hack and bug bounty
Windows Security — User Interface Privilege Isolation (UIPI)
Medium
Windows Security — User Interface Privilege Isolation (UIPI)
User Interface Privilege Isolation (UIPI) was introduced in Windows 2008/Vista with the goal of mitigating “Shatter Attacks”. Those types…
hack and bug bounty
Tenable CTF 2023
Medium
Tenable CTF 2023
Hello Hackers this my first and not last write up i want to share my solutions.
And for those not familiar with Capture The Flag (CTF)…
hack and bug bounty
Exploiting File Upload In DVWA Using The Tool Dvwaupsploit
Medium
Exploiting File Upload In DVWA Using The Tool Dvwaupsploit
Recently, we developed a tool used to exploit file upload vulnerabilities. What tool is it? The tool is called “dvwaupsploit,” short form…
hack and bug bounty
Revealing a Security Flaw: How I Discovered a Data Leak.
Medium
Revealing a Security Flaw: How I Discovered a Data Leak.
TLDR; Discovered a programming bug exposing sensitive data on a financial platform, reported it and received an appreciation letter from…
hack and bug bounty
ISO/IEC 27701, preview
Medium
ISO/IEC 27701, preview
ISO27701은 개인정보 보호를 위한 ISO27001 및 ISO27002의 확장판으로, 조직이 개인정보보호를 위해 갖추어야하는 요구사항과 가이드라인을 동시에 제공한다.