hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Agent Sudo — TryhackMe WriteUp
Medium
Agent Sudo — TryhackMe WriteUp
Hello readers, let’s dive into the depths of cyber intrigue with ‘Agent Sudo,’ a captivating easy rated room on TryHackMe. Imagine yourself…
hack and bug bounty
Windows Security — Primary Access Token
Medium
Windows Security — Primary Access Token
Overall, there are two types of access tokens (https://medium.com/@boutnaru/windows-security-access-token-81cd00000c64) — as stated in the…
hack and bug bounty
मस्क और जुकरबर्ग का रद्द हुआ केज मैच मर्दाना चिंता के बारे में क्या कहता है
Medium
मस्क और जुकरबर्ग का रद्द हुआ केज मैच मर्दाना चिंता के बारे में क्या कहता है
जबकि पिंजरे के बीच लड़ाई होती है मेटा सीईओ मार्क जुकरबर्ग और टेस्ला सीईओ एलोन मस्क ऐसा लगता है कि यह रुका हुआ है, अगर ये लोग कभी झगड़ा करना बंद कर देते हैं, तो यह “टेक भाई” शब्द को एक नया अर्थ देगा।…
hack and bug bounty
CompTIA PenTest+ Exam: A Comprehensive Overview
Medium
CompTIA PenTest+ Exam: A Comprehensive Overview
For experts looking to prove their expertise in penetration testing and ethical hacking, the CompTIA PenTest+ exam is a widely recognised…
hack and bug bounty
Navigating a Code-Based Vulnerability ️♂️: HTML Injection
Medium
Navigating a Code-Based Vulnerability
🕵️♂️
: HTML Injection
In cybersecurity, threats to online applications are in a constant state of evolution. Among these digital predators, HTML Injection…
hack and bug bounty
T-Pot Installation and Use
Medium
T-Pot Installation and Use
The T-Pot Honeypot framework is a multi-use Honeypot framework that deploys custom Docker containers to a set of protocols that emulate…
hack and bug bounty
Hacking for Good: How Ethical Hackers Keep the Cyberworld Safe(Part-03)
Medium
Hacking for Good: How Ethical Hackers Keep the Cyberworld Safe(Part-03)
In the exploitation stage of a penetration test, vulnerabilities in the target systems, networks, or applications are attempted…
hack and bug bounty
X Pro, Formerly TweetDeck, Rebrands and Becomes a Paid Blue Premium Service
Medium
X Pro, Formerly TweetDeck, Rebrands and Becomes a Paid Blue Premium Service
Key takeaways
hack and bug bounty
Basic Understanding of SQL Injection and Types of SQL Injection | 2023
Medium
Basic Understanding of SQL Injection and Types of SQL Injection | 2023
Unveiling the Depths of SQL Injection Vulnerabilities | Karthikeyan Nagaraj
hack and bug bounty
(IDOR) How do I find the first vulnerability with a $2500 bounty on hackerone.
Medium
(IDOR) How do I find the first vulnerability with a $2500 bounty on hackerone
Hello everyone, my name is Muhamad Iman Follow my Linkedin. I was new to ethical hacking about five months ago.
hack and bug bounty
Why Did Twitter Change to X?
Medium
Why Did Twitter Change to X?
Whether or not you are an avid social media user, you likely noticed recently that the famous platform Twitter underwent a major overhaul…
hack and bug bounty
How i escalate P5 to P3
Medium
How i escalate P5 to P3
self-xss to exploitable-xss
hack and bug bounty
Master and Find XSS Easily
Medium
Master and Find XSS Easily
Hi , I’m shellreaper again and today I’m gonna explain to you RXSS(Reflected XSS) and SXSS(Stored XSS ) in a simple way.
hack and bug bounty
An IDOR leads join any group makes me $2,500
Medium
An IDOR leads join any group makes me $2,500
Simple IDOR rewards $2,500
💰
hack and bug bounty
The Linux Kernel Macro Journey — “__randomize_layout”
Medium
The Linux Kernel Macro Journey — “__randomize_layout”
Overall, “__randomize_layout” is macro which defined in the Linux source code as part of the “compiler_type.h” file…
hack and bug bounty
MISSION OSCP: Step 1 — Base Camp
Medium
MISSION OSCP: Step 1 — Base Camp
Hi all,
hack and bug bounty
DEF CON 31: A Journey From Top To Bottom
Medium
DEF CON 31: A Journey From Top To Bottom
After the end of the DEF CON 31: Hacker Conference 2023 | #1 Hacker Event, I started writing this «capture the event» forensics report at…
hack and bug bounty
API Security — Authentication & Authorization
Medium
API Security — Authentication & Authorization
Problem Statement: In the era of digital transformation, monoliths are broken into stateless APIs. For any organization, the externally…
hack and bug bounty
Lab 1: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data — 1 | 2023
Medium
Lab 1: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data — 1 | 2023
To solve the lab, perform a SQL injection attack that causes the application to display one or more unreleased products | Karthikeyan…
hack and bug bounty
Linux : Mengenal Sistem Operasi Sumber Terbuka dan 5 Contoh Distro Linux
Medium
Linux : Mengenal Sistem Operasi Sumber Terbuka dan 5 Contoh Distro Linux
Linux merupakan salah satu sistem operasi yang telah mewarnai dunia komputasi sejak pertengahan 1990-an. Disebut juga sebagai “kernel”…