hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Windows Security — Access Token
Medium
Windows Security — Access Token
“Access Token” is an object which represents the access rights/privileges/identity for a specific process/thread. The operating system…
hack and bug bounty
Nautilus Chain and Hats Finance Collaboration: Advancing a Safer and More Robust Nautilus Ecosystem
Medium
Nautilus Chain and Hats Finance Collaboration: Advancing a Safer and More Robust Nautilus Ecosystem
Nautilus Chain, an innovative modular Layer3 chain utilizing the Celestia modular foundation, has joined forces with Hats Finance, a…
hack and bug bounty
Gaps in AI for AppSec
Medium
Gaps in AI for AppSec
Artificial Intelligence (AI) has made significant strides in various fields, including application security. However, it’s important to…
hack and bug bounty
Bug Bounty — What O/S should I use?
Medium
Bug Bounty — What O/S should I use?
I often see questions online such as “which OS is the best for bug bounty?” or “what Linux distro should I use?”
hack and bug bounty
TryHackMe - Pickle Rick
Medium
TryHackMe - Pickle Rick
TryHackMe sitesinde bulunan Pickle Rick CTF’i basit bir CTF’dir. Bu yazıda bu odayı çözerken izlediğim yolları derledim.
hack and bug bounty
Cyber Threat Intelligence; Data Science for Security
Medium
Cyber Threat Intelligence; Data Science for Security
In this modern age, there is a quote “data is the new gold”. As large amount of information generated and exchanged everyday. Just as gold…
hack and bug bounty
The Goldmine on Windows Computers
Medium
The Goldmine on Windows Computers
The LSASS (Local Security Authority Subsystem Service) process in Windows systems is a critical component responsible for authenticating…
hack and bug bounty
How to use Netsniff-ng and Wireshark in Kali Linux to Capture Login Credentials
Medium
How to use Netsniff-ng and Wireshark in Kali Linux to Capture Login Credentials
Introduction
hack and bug bounty
Pentesting | Exploiting FTP
Medium
Pentesting | Exploiting FTP
What is FTP (File Transfer Protocol)
hack and bug bounty
How to catch a Reverse shell over the Internet
Medium
How to catch a Reverse shell over the Internet
In this blog, I talk about exposing one local port to the internet and using it to catch reverse shells like we would do in any local…
hack and bug bounty
Exploit Eternal Blue (MS17–010) for Window 7 and higher (custom payload)
Medium
Exploit Eternal Blue (MS17–010) for Window 7 and higher (custom payload)
Summary
This article shows you how to exploit the MS17–010 vulnerability on Windows 7 or higher.
hack and bug bounty
GraphQL API Hacking!
Medium
GraphQL API Hacking!
Usually graphql endpoint are located at www.example.com/graphql.
hack and bug bounty
Attacking Service Accounts with Kerberoasting
Medium
Attacking Service Accounts with Kerberoasting
Today, we will discuss an old and well-known attack against Kerberos authentication during an Active Directory pentesting assessment called…
hack and bug bounty
Flutter Reverse Engineering and Security Analysis
Medium
Flutter Reverse Engineering and Security Analysis
Introduction
hack and bug bounty
Exploiting SQL Injection in Graphql | DVGA |
Medium
Exploiting SQL Injection in Graphql | DVGA |
This article covers exploiting SQL Injection manually in a Graphql Application.
hack and bug bounty
Finding Unauthorized API Access in Android Application
Medium
Finding Unauthorized API Access in Android Application
During my free time, i downloaded a android application from google play store for fun, i have actually known this application for a long…
hack and bug bounty
CrackMapexec | SMB & AD Enumeration Simplified !
Medium
CrackMapexec | SMB & AD Enumeration Simplified !
Have you ever found yourself staring at a Windows network, wondering how to find vulnerabilities and security holes? Don’t worry, CrackMapExec is here to save the day! It’s like having a Swiss Army…
hack and bug bounty
Exploit Development: What is STACK and how a STACK works.
Medium
Exploit Development: What is STACK and how a STACK works.
What is a stack?
hack and bug bounty
How I leveraged XSS to make Privilege Escalation to be Super Admin!
Medium
How I leveraged XSS to make Privilege Escalation to be Super Admin!
First of all, This was a private program, so I will refer to it with example.com.
Let me tell you how I found the Reflected XSS…
hack and bug bounty
Methods For Exploiting File Upload Vulnerabilities
Medium
Methods For Exploiting File Upload Vulnerabilities
This blog post was published on PurpleBox website on July 20th, 2022.