hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
How to Crush BSCP Exam in 75 Mins — BSCP Review
Medium
How to Crush BSCP Exam in 75 Mins — BSCP Review
Hi, I’m Ossama Yasser, and this is a guide to pass the Burp Suite Certified Practitioner Exam (BSCP) easily.
hack and bug bounty
Descubra como encontrar buckets ocultos na nuvem da Amazon S3!
Medium
Descubra como encontrar buckets ocultos na nuvem da Amazon S3!
👀
🔍
Hoje vamos falar sobre uma parada que é pura emoção: encontrar diretórios ocultos nos famosos S3 buckets da Amazon.
hack and bug bounty
Understanding Prototype Pollution Through Analogy
Medium
Understanding Prototype Pollution Through Analogy
In JavaScript, objects have a prototype, which is itself another object from which they inherit properties. When we create a new object, it can inherit properties and methods from a prototype object…
hack and bug bounty
Web Cache Poisoning: A Tale of Mischievous Mischief
Medium
Web Cache Poisoning: A Tale of Mischievous Mischief
Web Cache Poisoning is a type of cyber attack where an attacker manipulates a web cache (a temporary storage for web pages to reduce server load) to serve poisoned or malicious content to users. The…
hack and bug bounty
Race Condition Vulnerability Explained: The Train Station Analogy
Medium
Race Condition Vulnerability Explained: The Train Station Analogy
Imagine you’re at a busy train station, standing in front of two ticket machines. These machines are positioned side by side, and both access the same central database to check the availability of…
hack and bug bounty
Understanding SQL Injection Through the Lens of a Library
Medium
Understanding SQL Injection Through the Lens of a Library
Imagine a vast library, filled with countless books, journals, and manuscripts. This library is a cherished resource for a town, and people from all walks of life visit to borrow books or gather…
hack and bug bounty
Cross-Site Scripting (XSS) Explained with an Analogy: The Poisoned Candy
Medium
Cross-Site Scripting (XSS) Explained with an Analogy: The Poisoned Candy
Imagine the internet as a vast candy store, where websites are different candy stalls, and the candies represent the content you interact with. Cross-Site Scripting, commonly abbreviated as XSS, is a…
hack and bug bounty
Time-Traveling for Money: Discovering Secrets in Vintage JavaScript Files
Medium
Time-Traveling for Money: Discovering Secrets in Vintage JavaScript Files
Are you ready for an exciting digital adventure? Get ready to embark on a journey where hidden secrets and old code may lead you to…
hack and bug bounty
RootMe TryHackMe: WriteUp
Medium
RootMe TryHackMe: WriteUp
Task 1: Deploy the machine:-
hack and bug bounty
Unlocking the Secrets of ‘ROOTMe’: My TryHackMe Journey
Medium
Unlocking the Secrets of ‘ROOTMe’: My TryHackMe Journey
I started off my experience with ‘ROOTMe’ as an assignment, but it turned into fun and learning! As I delved deeper into the challenges, I…
hack and bug bounty
Common Ethical Hacking Techniques Explained: How They Help Uncover Vulnerabilities
Medium
Common Ethical Hacking Techniques Explained: How They Help Uncover Vulnerabilities
In a world where cyber threats are becoming increasingly sophisticated and pervasive, the importance of cybersecurity cannot be overstated…
hack and bug bounty
BAC — Bozuk Erişim Kontrolü Nedir? — A01:2021
Medium
BAC — Bozuk Erişim Kontrolü Nedir? — A01:2021
Bu yazıda erişim kontrolü kavramını ve “bozuk erişim kontrolü” zafiyetini basitleştirilmiş örneklerle inceleyeceğiz.
hack and bug bounty
Web Sockets in Web App Penetration Testing | 2023
Medium
Web Sockets in Web App Penetration Testing | 2023
In this section, we’ll explain what Web sockets is, describe some types, explain how to find and exploit various kinds of Web sockets and…
hack and bug bounty
Password-less Authentication
Medium
Password-less Authentication
What it is, how it works and what it solves…
hack and bug bounty
Ethical Hacking Mastery: A Year-Long Journey from Beginner to Expert.
Medium
Ethical Hacking Mastery: A Year-Long Journey from Beginner to Expert.
A 12-month roadmap for beginners looking to become ethical hackers is an extended plan that allows for a more in-depth exploration of the…
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, October 29, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, October 29, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Rootme write-up (Try Hack Me)
Medium
Rootme write-up (Try Hack Me)
Introduction
hack and bug bounty
Hack Social Media Using these 3technologies.
Medium
Hack Social Media Using these 3technologies.
Social Media has an deep impact on the life of an individual with an personal and social life. It promotes social life of an individual and…
hack and bug bounty
The Hacker’s Half-Year: A 6-Month Adventure in Security.
Medium
The Hacker’s Half-Year: A 6-Month Adventure in Security.
Studying Ethical Hacking requires dedication and a systematic approach. Keep in mind that the number of days you allocate to each task can…
hack and bug bounty
Unearthing Metabase’s Secrets: A Deep Dive into Remote Code Execution | HackTheBox Analytics…
Medium
Unearthing Metabase’s Secrets: A Deep Dive into Remote Code Execution | HackTheBox Analytics…
Once upon a time in the clandestine world of ethical hacking and cybersecurity, a talented hacker known as Alex was searching for a new…