hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
2.4.3 Quiz — Planning and Scoping a Penetration Testing Assessment
Medium
2.4.3 Quiz — Planning and Scoping a Penetration Testing Assessment
This is a write up for the Second quiz you will encounter on Cisco’s Ethical Hacker course, please attempt to study the given material…
hack and bug bounty
Critical SQL Injection Vulnerability in Login Page CVE-2023–44970
Medium
Critical SQL Injection Vulnerability in Login Page CVE-2023–44970
hack and bug bounty
TryHackMe-Pickle Rick(WriteUp)
Medium
TryHackMe-Pickle Rick(WriteUp)
Hello lovely people! I hope you are all doing great. Another one in the writeups list after so long. I hope you’ll enjoy this one too.
hack and bug bounty
InfoSecSherpa’s News Roundup for Wednesday, October 4, 2023
Medium
InfoSecSherpa’s News Roundup for Wednesday, October 4, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Android static code analysis
Medium
Android static code analysis
بسم الله الرحمن الرحيم
in the name of allah the Most Gracious, Most Merciful
hack and bug bounty
HeartBleed Writeup
Medium
HeartBleed Writeup
Written by Substing for the TryHackMe room.
Room can be found here.
hack and bug bounty
Exploring the Depths: Metasploit Framework Structure Unveiled
Medium
Exploring the Depths: Metasploit Framework Structure Unveiled
Introduction
hack and bug bounty
Mastering Metasploit: A Beginner’s Guide to msfconsole Basic Commands
Medium
Mastering Metasploit: A Beginner’s Guide to msfconsole Basic Commands
Introduction
hack and bug bounty
From to Medium — 10 Reasons I’m Starting to Write on Medium
Medium
From 𝕏 to Medium — 10 Reasons I’m Starting to Write on Medium
I’ve been writing on 𝕏 for more than a month and now I’ve decided to expand to Medium. Here are 10 reasons why I made this decision.
hack and bug bounty
How To Hack Wi-Fi Password Using Hashcat.
Medium
How To Hack Wi-Fi Password Using Hashcat.
In this guide, you will learn how to crack WiFi passwords using Hashcat. Hashcat is a powerful password recovery tool that can help you recover lost or forgotten passwords for a variety of platforms…
hack and bug bounty
Chocolate Factory CTF Writeup
Medium
Chocolate Factory CTF Writeup
This documents my adventures in TryHackMe’s Chocolate Factory room, which can be found here.
hack and bug bounty
Browser Extensions for Fun and Profit @ Texas Cyber Summit | USA
Medium
Browser Extensions for Fun and Profit @ Texas Cyber Summit | USA
Conducting our browser security workshop in Texas, USA
hack and bug bounty
Advantages of Ethical Hacking: Strengthening Cybersecurity
Medium
Advantages of Ethical Hacking: Strengthening Cybersecurity
In today’s digitally driven world, the importance of cybersecurity cannot be overstated. As technology advances, so do the methods employed…
hack and bug bounty
Step by Step Walking An Application Walkthrough
Medium
Step by Step Walking An Application Walkthrough
In this room, we will discover the art of personally inspecting a web application for security concerns using the tools already built into…
hack and bug bounty
“RCE in IoT Devices” Identifying and Exploiting Vulnerabilities
Medium
“RCE in IoT Devices” Identifying and Exploiting Vulnerabilities
The Internet of Things (IoT) has revolutionized our world, connecting everything from smart thermostats to industrial machinery to the…
hack and bug bounty
Exploiting Open Redirects in OAuth 2.0: A Case Study
Medium
Exploiting Open Redirects in OAuth 2.0: A Case Study
OAuth 2.0 is a widely adopted protocol for granting third-party applications limited access to a user’s protected resources. It’s the…
hack and bug bounty
Bypassing Open Redirect Mitigations: A Hunter’s Perspective
Medium
Bypassing Open Redirect Mitigations: A Hunter’s Perspective
Open redirects have long been a favorite target for attackers seeking to compromise user security and privacy. These vulnerabilities allow…
hack and bug bounty
“Ethical Hacking: Securing the Digital Frontier”
Medium
“Ethical Hacking: Securing the Digital Frontier”
In today’s interconnected world, cybersecurity is of paramount importance. This online ethical hacking course is designed to equip you with…
hack and bug bounty
Mastering Network Control with the ‘nc’ Command in Ethical Hacking
Medium
Mastering Network Control with the ‘nc’ Command in Ethical Hacking
Introduction
hack and bug bounty
3 Reasons Why University Students Should begin to write on
Medium
3 Reasons Why University Students Should begin to write on 𝕏
Starting to write online when you’re studying at the university is the ideal time, if you want to use your writing skills as a possible…