hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Defend Against QR Code Phishing or Quishing Attacks
Medium
Defend Against QR Code Phishing or Quishing Attacks
🛡️
Cybersecurity Alert!
hack and bug bounty
Hacking WordPress sites using Brute Force Attacks
Medium
Hacking WordPress sites using Brute Force Attacks
In this article, you will learn how to compromise WordPress login credentials using brute-force attacks.
hack and bug bounty
Ex-Twitter Executives Win $1.1 Million Legal Fees From Musk’s X
Medium
Ex-Twitter Executives Win $1.1 Million Legal Fees From Musk’s X
A judge ordered that X Corporation, previously known as Twitter, must pay a total of 1.1 million dollars in legal costs accrued by a number…
hack and bug bounty
LFI/RFI lab
Medium
LFI/RFI lab
Daha öncəki məqalədə LFI/RFI haqqında bəhs etmişdik. Aşağıdakı linkdən daha ətraflı məlumat əldə edə bilərsiniz. Təbii ki, üzərində çalışacağımız lab
👉
OWASP Broken Web Applications Project. Maşını…
hack and bug bounty
LFI/RFI lab
Medium
LFI/RFI lab
Daha öncəki məqalədə LFI/RFI haqqında bəhs etmişdik. Aşağıdakı linkdən daha ətraflı məlumat əldə edə bilərsiniz.
hack and bug bounty
OSCE³ REVIEW
Medium
OSCE³ REVIEW
The devil is not so black as he is painted.
hack and bug bounty
The use of APIs (application programming interfaces) is vital to many activities on the internet.
Medium
The use of APIs (application programming interfaces) is vital to many activities on the internet.
1. Identification and Authentication
hack and bug bounty
Day 6: Ransomware Attacks — Strategies to Prevent and Respond
Medium
Day 6: Ransomware Attacks — Strategies to Prevent and Respond
Welcome to Day 6 of Cybersecurity Awareness Month. Today, I’ll delve into one of the most menacing threats facing individuals and…
hack and bug bounty
What is Zero-day attack and how to protect yourself
Medium
What is Zero-day attack and how to protect yourself
Zero-day attacks are a specific type of cyber attack that take advantage of a software vulnerability that remains unknown to the software vendor. This essentially means that the vendor has no…
hack and bug bounty
Task 7: Unleash the Password Cracker
Medium
💥
Task 7: Unleash the Password Cracker
password security is crucial. Today, we’re equipping you with the knowledge and tools to crack passwords and decipher encrypted data.
hack and bug bounty
How to Approach Management About Workplace Information Security
Medium
How to Approach Management About Workplace Information Security
Learn how to persuade management to prioritize workplace information security and protect your organization from costly cyber attacks.
hack and bug bounty
5+All Security Resource Digest for 2023–10–6
Medium
5+All Security Resource Digest for 2023–10–6
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Agent T | TryHackMe
Medium
Agent T | TryHackMe
Something seems a little off with the server.
hack and bug bounty
Store File in Windows Registry
Medium
Store File in Windows Registry
In the ever-evolving world of cybersecurity, where the line between ethical hacking and malevolent exploits blurs, it’s essential to…
hack and bug bounty
☄️
SEC Takes Legal Action Against Elon Musk
Medium
☄️
SEC Takes Legal Action Against Elon Musk
The US Securities and Exchange Commission (SEC) has initiated legal proceedings against Elon Musk, accusing him of refusing to provide…
hack and bug bounty
Exploiting File Upload Vulnerabilities for Remote Code Execution
Medium
Exploiting File Upload Vulnerabilities for Remote Code Execution
In today’s digital age, web applications play a pivotal role in our daily lives. From social media platforms to e-commerce websites, these…
hack and bug bounty
Unveiling Cybersecurity’s Essential Trio: CVE, CWE, and NVD
Medium
Unveiling Cybersecurity’s Essential Trio: CVE, CWE, and NVD
Hey Medium readers!
📚
Let’s unravel some cybersecurity mysteries and shed light on three important acronyms: CVE, CWE, and NVD.
🤓
hack and bug bounty
Fuzzing Web Applications: An Effective Approach to Security Testing
Medium
Fuzzing Web Applications: An Effective Approach to Security Testing
Web applications have become an integral part of our daily lives, handling sensitive data and serving as a gateway for online interactions…
hack and bug bounty
EternalBlue: Raising Awareness and Staying Secure in the World of Windows Vulnerabilities
Medium
EternalBlue: Raising Awareness and Staying Secure in the World of Windows Vulnerabilities
Introduction
In the fast-evolving landscape of cybersecurity, staying informed about potential threats is crucial. One such threat that…
hack and bug bounty
XXE Attack Techniques to Bypass WAF and IDS
Medium
XXE Attack Techniques to Bypass WAF and IDS
In today’s digital landscape, web applications have become the lifeblood of our online world. However, with great convenience comes great…