hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
SSRF to fetch AWS credentials with full access to various services
Medium
SSRF to fetch AWS credentials with full access to multiple services
This is a post about how I found a simple yet really critical vulnerability in a bug bounty program. It was the most critical bug I have…
hack and bug bounty
Bug Bounty — Beginner’s guide
Medium
Where to start?
There are lots of guides on how to start into Bug Bounty Hunting but I will share my personal experience of getting into bug bounty…
hack and bug bounty
IDOR in session cookie leading to Mass Account Takeover
Medium
IDOR in session cookie leading to Mass Account Takeover
If you are familiar with what IDOR is, you will know that it can be anywhere from url, request body, GET or POST requests and yes, in…
hack and bug bounty
Hacking Hackers for fun and profit
Medium
Hacking Hackers for fun and profit
This story will be in several parts. In each of the situations, I had to face unexpected results. By and large, these are stories that have…
hack and bug bounty
How I accidentally hacked many companies using N/A vulnerability in Atlassian Cloud
Medium
How I accidentally hacked many companies using N/A vulnerability in Atlassian Cloud
Below you will learn in detail about the discovered vulnerability that allowed me to get about 15000$ in bounty with all secrets from the…
hack and bug bounty
Credential stuffing in Bug bounty hunting
Medium
Credential stuffing in Bug bounty hunting
Bug hunting is not always about looking for classic vulnerabilities (XSS, SQLi, SSRF, RCE, etc). Sometimes it is a search for a new problem…
hack and bug bounty
$10,000 for a vulnerability that doesn’t exist
Medium
$10,000 for a vulnerability that doesn’t exist
A couple of months ago, an interesting story happened to me. I caught a Path Traversal issue with no chance to reproduce it again.
hack and bug bounty
From CRLF to Account Takeover
Medium
From CRLF to Account Takeover
At the beginning of March,while researching one site I discovered the new functionality. The functionality allowed the user to login via…
hack and bug bounty
Broke limited scope with a chain of bugs
Medium
Broke limited scope with a chain of bugs (tips for every rider CORS)
One morning, I was asked to participate in a private bug bounty program. In general, my experience in security is based on such private…
hack and bug bounty
Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet
Medium
Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet
Infiltrating Corporate Intranet like Banks, Governments, Airports became possible with vulnerable SSL VPN clients.
hack and bug bounty
Jenkins RCE PoC or simple pre-auth remote code execution on the Server.
Medium
Jenkins RCE PoC or simple pre-auth remote code execution on the Server.
Once upon a time, a friend of mine asked me a question — "Do you know any fresh RCE for the Jenkins environment ?". I was informed already…
hack and bug bounty
Two Easy RCE in Atlassian Products
Medium
Two Easy RCE in Atlassian Products
It was a long time from my last article. It was so many interesting results in my work. Seems that it's right time to share my knowledge…
hack and bug bounty
SSRF Vulnerability due to Sentry misconfiguration
Medium
SSRF Vulnerability due to Sentry misconfiguration
That story happened when I saw that disclosed report.
hack and bug bounty
How We “Forced” Our Client To Fix A Low Severity Security Bug And Still Got Appreciated!
Medium
How We “Forced” Our Client To Fix A Low Severity Security Bug And Still Got Appreciated!
We at DefCore Security intend to provide great visibility to clients while working on the pentest engagement. We give our clients the…
hack and bug bounty
Chaining Cache Poisoning To Stored XSS
Medium
Chaining Cache Poisoning To Stored XSS
One of the benefits of being a developer is that you can guess how stuff is working at the server end. You can try to debug how the…
hack and bug bounty
Chaining Tricky OAuth Exploitation To Stored XSS
Medium
Chaining Tricky OAuth Exploitation To Stored XSS
Hey everyone, hope you all are having a great 2019 so far.
hack and bug bounty
A Simple CORS Misconfig Leaked Private Post Of Twitter, Facebook & Instagram
Medium
A Simple CORS Misconfig Leaked Private Post Of Twitter, Facebook & Instagram
Hey Everyone, this is my first story on Medium(one of my friend told me how easy and productive Medium is). If you want to read my…
hack and bug bounty
Cloud Access Security Broker Market Size, Latest Trends, Revenue Growth & Key Companies
Medium
Cloud Access Security Broker Market Size, Latest Trends, Revenue Growth & Key Companies
According to a new report published by Allied Market Research, titled, “Cloud Access Security Broker Market,” The Cloud Access Security…
hack and bug bounty
SAST vs DAST: Apa metode terbaik untuk pengujian keamanan aplikasi ?
Medium
SAST vs DAST: Apa metode terbaik untuk pengujian keamanan aplikasi ?
SAST dan DAST adalah metodologi pengujian keamanan aplikasi yang digunakan untuk menemukan kerentanan keamanan yang dapat membuat… read…
hack and bug bounty
Learning Thick Client VAPT with me.
Medium
Learning Thick Client VAPT with me.
Hey there.