hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
HTB — Resolute | 80/100
Medium
HTB — Resolute | 80/100
Hi! Today I’m working on box 80 out of a planned 100, Resolute from HackTheBox. This medium rated room focused on Active Directory attacks…
hack and bug bounty
For Offensive Security Learners
Medium
For Offensive Security Learners
This is a story for those of you who are just breaking into cyber security and are looking towards penetration testing and offensive…
hack and bug bounty
Exploring the Cost-Effectiveness of Security as a Service!
Medium
Exploring the Cost-Effectiveness of Security as a Service!
Explore the protective benefits that cloud security solutions and application security services provide and how these help in improving…
hack and bug bounty
PatriotCTF2023
Medium
PatriotCTF2023
Hello Hackers, this my write up for challenges I could solve in PatriotCTF2023!
hack and bug bounty
How to avoid web cache poisoning attacks
Medium
How to avoid web cache poisoning attacks
Web cache poisoning is a cyber attack that wreaks havoc on unsuspecting websites. It exploits vulnerabilities by caching mechanisms that web servers, proxies, and content delivery networks (CDNs)…
hack and bug bounty
Comprehensive Beginner’s Guide to Reverse Engineering
Medium
Comprehensive Beginner’s Guide to Reverse Engineering
Welcome to the thrilling world of reverse engineering! In this comprehensive guide, we’ll delve deep into what reverse engineering is, its…
hack and bug bounty
Mastering Buffer Overflow Vulnerability Pentesting: A Comprehensive Guide
Medium
Mastering Buffer Overflow Vulnerability Pentesting: A Comprehensive Guide
Buffer overflow vulnerabilities have long been a significant concern in cybersecurity. They occur when a program writes more data into a…
hack and bug bounty
Cracking the Code: Your Roadmap to Penetration Testing Success
Medium
Cracking the Code: Your Roadmap to Penetration Testing Success
Introduction
hack and bug bounty
Mastering Penetration Testing Enumeration: Unveiling Common Protocols
Medium
Mastering Penetration Testing Enumeration: Unveiling Common Protocols
Introduction
hack and bug bounty
6.2 Lab: Information disclosure on debug page | 2023
Medium
6.2 Lab: Information disclosure on debug page | 2023
This lab contains a debug page that discloses sensitive information about the application. To solve the lab, obtain and submit the…
hack and bug bounty
From Zero to Hero: The Inspirational Journey of Elon Musk
Medium
From Zero to Hero: The Inspirational Journey of Elon Musk
In the world of technology and innovation, few names shine as brightly as Elon Musk’s. His journey from a relatively unknown entrepreneur…
hack and bug bounty
Introduction & How to use vulnshot.com
Medium
Introduction & How to use vulnshot.com
🪲
If you need to manage the Nuclei CLI output which was previously only limited to chat lines on Telegram, Discord, and others, with VulnShot…
hack and bug bounty
Security Metrics and KPIs an untold story..
Medium
Security Metrics and KPIs an untold story..
To ensure the safety of your organization’s digital assets, you must be able to measure the effectiveness of your security operations and…
hack and bug bounty
Decrypting the Blockchain: Block Explorers and Transactions Analysis
Medium
Decrypting the Blockchain: Block Explorers and Transactions Analysis
Handy directory of multiple web-based tools to analyze different blockchain networks
hack and bug bounty
What is Footprinting?
Medium
What is Footprinting?
Imagine you’re a digital detective, Sherlock Holmes of the internet, trying to piece together clues to solve a mystery. That’s essentially…
hack and bug bounty
Crossing Boundaries: A Deep Dive into Cross-Origin Attacks and Their Prevention
Medium
Crossing Boundaries: A Deep Dive into Cross-Origin Attacks and Their Prevention
Hello Smart hackers, Welcome back to my new blog, I hope you all are well!! In this blog, we are going to discuss Cross-Origin Attacks and…
hack and bug bounty
Top Cyber Security Podcast You Should Listen Now
Medium
Top Cyber Security Podcast You Should Listen Now
If you are travelling or you can some free time then you can listen to this amazing cyber security podcast to expand you discovery in…
hack and bug bounty
TOP 10 PROGRAMMING LANGUAGES EVERY ETHICAL HACKER SHOULD LEARN
Medium
TOP 10 PROGRAMMING LANGUAGES EVERY ETHICAL HACKER SHOULD LEARN
Python is often the first choice for ethical hackers due to its simplicity and versatility. It offers numerous libraries and frameworks, such as Scapy for packet manipulation and PyCrypto for…
hack and bug bounty
Pentest Checklist: Preparing for a Penetration Test
Medium
Pentest Checklist: Preparing for a Penetration Test
Preparing for a penetration test can be stressful to say the least.
hack and bug bounty
Benefits of Penetration Testing
Medium
Benefits of Penetration Testing
In the dynamic landscape of the digital era, cyber threats are a constant concern. As organizations are continuously on the lookout for…