hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Cyber Threat Intelligence; Data Science for Security
Medium
Cyber Threat Intelligence; Data Science for Security
In this modern age, there is a quote “data is the new gold”. As large amount of information generated and exchanged everyday. Just as gold…
hack and bug bounty
The Goldmine on Windows Computers
Medium
The Goldmine on Windows Computers
The LSASS (Local Security Authority Subsystem Service) process in Windows systems is a critical component responsible for authenticating…
hack and bug bounty
How to use Netsniff-ng and Wireshark in Kali Linux to Capture Login Credentials
Medium
How to use Netsniff-ng and Wireshark in Kali Linux to Capture Login Credentials
Introduction
hack and bug bounty
Pentesting | Exploiting FTP
Medium
Pentesting | Exploiting FTP
What is FTP (File Transfer Protocol)
hack and bug bounty
How to catch a Reverse shell over the Internet
Medium
How to catch a Reverse shell over the Internet
In this blog, I talk about exposing one local port to the internet and using it to catch reverse shells like we would do in any local…
hack and bug bounty
Exploit Eternal Blue (MS17–010) for Window 7 and higher (custom payload)
Medium
Exploit Eternal Blue (MS17–010) for Window 7 and higher (custom payload)
Summary
This article shows you how to exploit the MS17–010 vulnerability on Windows 7 or higher.
hack and bug bounty
GraphQL API Hacking!
Medium
GraphQL API Hacking!
Usually graphql endpoint are located at www.example.com/graphql.
hack and bug bounty
Attacking Service Accounts with Kerberoasting
Medium
Attacking Service Accounts with Kerberoasting
Today, we will discuss an old and well-known attack against Kerberos authentication during an Active Directory pentesting assessment called…
hack and bug bounty
Flutter Reverse Engineering and Security Analysis
Medium
Flutter Reverse Engineering and Security Analysis
Introduction
hack and bug bounty
Exploiting SQL Injection in Graphql | DVGA |
Medium
Exploiting SQL Injection in Graphql | DVGA |
This article covers exploiting SQL Injection manually in a Graphql Application.
hack and bug bounty
Finding Unauthorized API Access in Android Application
Medium
Finding Unauthorized API Access in Android Application
During my free time, i downloaded a android application from google play store for fun, i have actually known this application for a long…
hack and bug bounty
CrackMapexec | SMB & AD Enumeration Simplified !
Medium
CrackMapexec | SMB & AD Enumeration Simplified !
Have you ever found yourself staring at a Windows network, wondering how to find vulnerabilities and security holes? Don’t worry, CrackMapExec is here to save the day! It’s like having a Swiss Army…
hack and bug bounty
Exploit Development: What is STACK and how a STACK works.
Medium
Exploit Development: What is STACK and how a STACK works.
What is a stack?
hack and bug bounty
How I leveraged XSS to make Privilege Escalation to be Super Admin!
Medium
How I leveraged XSS to make Privilege Escalation to be Super Admin!
First of all, This was a private program, so I will refer to it with example.com.
Let me tell you how I found the Reflected XSS…
hack and bug bounty
Methods For Exploiting File Upload Vulnerabilities
Medium
Methods For Exploiting File Upload Vulnerabilities
This blog post was published on PurpleBox website on July 20th, 2022.
hack and bug bounty
ProFTPD Exploitation
Medium
ProFTPD Exploitation
ProFTPD (Professional File Transfer Protocol server Daemon) is an open-source software, used for FTP servers on Unix and Unix-like systems…
hack and bug bounty
Attacks on JSON Web Token (JWT)
Medium
Attacks on JSON Web Token (JWT)
In part1 of the article, I introduced JSON web tokens that what is JWT and How they are made? I prefer to take a look at that before you go…
hack and bug bounty
DNS Rebinding attack
Medium
DNS Rebinding attack
DNS Rebinding is a method of bypassing Same Origin Policy by manipulating DNS resolution
hack and bug bounty
Domain Takeover with PetitPotam Exploit
Medium
Domain Takeover with PetitPotam Exploit
domain escalation from a low-privileged user to a domain admin
hack and bug bounty
Using Metasploit to Attack Default SSH Username/Passwords
Medium
Using Metasploit to Attack Default SSH Username/Passwords
The Lab Environment