hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
İT sahəsinin bütün qollarına aid kurslar və kitablar arxivi. Bütün linklər işləkdir.
Medium
İT sahəsinin bütün qollarına aid kurslar və kitablar arxivi. Bütün linklər işləkdir.
Kanalıma abunə olub İT sahəsinə aid daha çox məlumatlar, ən əsası legal Hacking işləmləri görə bilərsiniz. Sizlər üçün praktik videolar çəkib paylaşıram mənə dəstək olsaz sevinərəm
🙏
Atıl…
hack and bug bounty
TryHackMe: Blue (Eternal Blue)
Medium
TryHackMe: Blue (Eternal Blue)
About the vulnerability:
hack and bug bounty
Exploring Cyber Security: Resources for Red Team and Blue Team Activities
Medium
Exploring Cyber Security: Resources for Red Team and Blue Team Activities
Hello everyone! In today’s blog, I’m going to highlight the resources available on the internet for both Red Team and Blue Team activities.
hack and bug bounty
Dumping Passwords From Database — Union-based SQL Injection Scripting
Medium
Dumping Passwords From Databases — Union-based SQL Injection Scripting
In the last article we discussed various types of SQL injection and presented a basic example of an in-band union-based injection attack…
hack and bug bounty
Brute It TryHackMe Walkthrough
Medium
Brute It TryHackMe Walkthrough
Hi Everyone!! This is Abel V. In this article, I will be sharing a walkthrough of “Brute It” from TryHackMe. I’ll guide you through the…
hack and bug bounty
Behind the Scenes of a $2500 Reward: Exploring SQL Injection on a Search Page
Medium
Behind the Scenes of a $2500 Reward: Exploring SQL Injection on a Search Page
In the vast landscape of cyberspace, where lines of code construct virtual realms and digital doors protect valuable information, an…
hack and bug bounty
Sudoedit Local Privilege Escalation Vulnerability (CVE-2023–22809)
Medium
Sudoedit Local Privilege Escalation Vulnerability (CVE-2023–22809)
On January 18th, 2023, Synacktiv released an advisory regarding a vulnerability in sudo (CVE-2023–22809). This vulnerability allows users…
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, August 27, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, August 27, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
My Checklist
Medium
My Checklist
According to data from prominent security standards such as OWASP,ISO,COBIT,NIST and popular security certificate providers such as…
hack and bug bounty
Guesswork Needed — Scripting for Blind SQL Injection
Medium
Guesswork Needed — Scripting for Blind SQL Injection
Topic introduction
hack and bug bounty
How I ethically hacked NASA via Google Dorking.
Medium
How I ethically hacked NASA via Google Dorking.
Hey! This is Prince Roy, a cyber security researcher. Recently, I have discovered an information disclosure vulnerability in one of the…
hack and bug bounty
Google Dorks: advance googling
Medium
Google Dorks: advance googling
It is an advance searching method on Google, commonly used by hackers, so they refer to as “Google Hacking”. It is a step of Information…
hack and bug bounty
Parent PID Spoofing —Process Identifier Manipulation
Medium
Parent PID Spoofing —Process Identifier Manipulation
Welcome to this in-depth article on Parent PID (Process Identifier) Spoofing, a technique that lies at the heart of malware development and…
hack and bug bounty
Experiment #7 (Under Lock & Key)
Medium
Experiment #7 (Under Lock & Key)
Previously in Experiment #6, we had a chance to explore API Keys and how to hide them the native way. We got to see how Google’s…
hack and bug bounty
My Journey to PNPT
Medium
My Journey to PNPT
I recently obtained the Practical Network Penetration Tester certification offered by TCM Security and I’m writing this post to tell you…
hack and bug bounty
DEF CON 31 WebSploit Labs Challenge Walkthrough
Medium
DEF CON 31 WebSploit Labs Challenge Walkthrough
I co-founded and one of the leads of the DEF CON Red Team Village. At DEF CON 31’s Red Team Village, I conducted two workshops:
hack and bug bounty
Cracking the Code:Implementing Secure Design Principles for Effective Software Development
Medium
Cracking the Code:Implementing Secure Design Principles for Effective Software Development
Part Two On A Series on Shifting Security Left In The Software Development Lifecycle
hack and bug bounty
Proving Grounds: Heist PenTest Report
Medium
Proving Grounds: Heist PenTest Report
A report on Heist, a hard rated machine from OffSec’s Proving Grounds
hack and bug bounty
Can Someone Hack Your Phone Through Text Messages?
Medium
Can Someone Hack Your Phone Through Text Messages?
Introduction
hack and bug bounty
Can Someone Hack Your Phone Through Text Messages?
Medium
Can Someone Hack Your Phone Through Text Messages?
Introduction