hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Account takeover of any user through password reset functionality.
Medium
Account takeover of any user through password reset functionality.
Hello Everyone,
hack and bug bounty
EC-Council CEH Practical / Master 準備心得-讓理論與實作相輔相成的學習
Medium
EC-Council CEH Practical / Master 準備心得 — 讓理論與實作相輔相成的學習
CEH Practical 是需要在 6 小時內完成 20 題實作考試的入門級實戰證照,很適合資安管理人員了解一些攻擊原理,畢竟管理人也絕對是需要懂防守與攻擊技術概念。早期的 CEH 考試沒有實作,而現在 CEH Practical…
hack and bug bounty
Mastering the Basics: Bandit Wargame Level 0 Walkthrough
Medium
Mastering the Basics: Bandit Wargame Level 0 Walkthrough
Introduction:
hack and bug bounty
Aleo FireSide Newspaper #24 (English)
Medium
Aleo FireSide Newspaper #24 (English)
The publication was prepared by: Gena | GG, rykovka, RoyHansen, AnnaB, Rufat, Sula and the_liolik
hack and bug bounty
Aleo FireSide Newspaper #24 (Ukrainian)
Medium
Aleo FireSide Newspaper #24 (Ukrainian)
Випуск підготували: Gena | GG, rykovka, RoyHansen, AnnaB, Rufat Sula і the_liolik
hack and bug bounty
Windows Security — User Interface Privilege Isolation (UIPI)
Medium
Windows Security — User Interface Privilege Isolation (UIPI)
User Interface Privilege Isolation (UIPI) was introduced in Windows 2008/Vista with the goal of mitigating “Shatter Attacks”. Those types…
hack and bug bounty
Tenable CTF 2023
Medium
Tenable CTF 2023
Hello Hackers this my first and not last write up i want to share my solutions.
And for those not familiar with Capture The Flag (CTF)…
hack and bug bounty
Exploiting File Upload In DVWA Using The Tool Dvwaupsploit
Medium
Exploiting File Upload In DVWA Using The Tool Dvwaupsploit
Recently, we developed a tool used to exploit file upload vulnerabilities. What tool is it? The tool is called “dvwaupsploit,” short form…
hack and bug bounty
Revealing a Security Flaw: How I Discovered a Data Leak.
Medium
Revealing a Security Flaw: How I Discovered a Data Leak.
TLDR; Discovered a programming bug exposing sensitive data on a financial platform, reported it and received an appreciation letter from…
hack and bug bounty
ISO/IEC 27701, preview
Medium
ISO/IEC 27701, preview
ISO27701은 개인정보 보호를 위한 ISO27001 및 ISO27002의 확장판으로, 조직이 개인정보보호를 위해 갖추어야하는 요구사항과 가이드라인을 동시에 제공한다.
hack and bug bounty
Zed Attack Proxy Nedir
Medium
Zed Attack Proxy Nedir
ZAP, istemci ile server arasına girerek web uygulamasının güvenlik testlerini yapmaya yarayan bir araçtır.
hack and bug bounty
A Quick Touch of Application Analysis with Snyk
Medium
A Quick Touch of Application Analysis with Snyk
Finding and fixing vulnerabilities from the first lines of code to the running cloud is quite critical for an enterprise.
hack and bug bounty
Single Sign-On (SSO): Potential flaws or vulnerabilities in the implementation
Medium
Single Sign-On (SSO): Potential flaws or vulnerabilities in the implementation
As an application security engineer, your responsibility is to identify and address potential flaws or vulnerabilities in the Single…
hack and bug bounty
Red Team Member — How to ensure persistence in a system.
Medium
Red Team Member — How to ensure persistence in a system.
Hello folks, today we’re going to talk about something interesting. Let’s talk about the subject in conversation at first and then move on…
hack and bug bounty
Join the API Security Testing Revolution with Pynt: Earn Your Digital Badges
Medium
Join the API Security Testing Revolution with Pynt: Earn Your Digital Badges
In the ever-evolving landscape of technology, the utilization of APIs (Application Programming Interfaces) has surged exponentially.
hack and bug bounty
Cybersecurity training and placement
Medium
Cybersecurity training and placement
H2K Infosys provides top-notch cybersecurity training and placement services. Learn vital skills such as ethical hacking, network security…
hack and bug bounty
AI helped me get $500 bounty with just one line of code
Medium
AI helped me get $500 bounty with just one line of code
One of the special HackerOne programs invited me. I worked on it for more than a week and couldn’t find any bugs. Although it had a very…
hack and bug bounty
Android Permission Bypass:
Medium
Android Permission Bypass:
Unauthorized Access through READ_EXTERNAL_STORAGE / WRITE_EXTERNAL_STORAGE
hack and bug bounty
Make Your Own Ransomware, (Part 1)
Medium
Make Your Own Ransomware, (Part 1)
Ransomware is fast becoming the most important form of malware affecting our digital systems. Companies around the world are being hit by…
hack and bug bounty
RPO, RTO and data protection in organizations
Medium
RPO, RTO and data protection in organizations
With the opportunity given to me, I wanted to write 2–3 things about data protection in companies and large organizations, because we…