hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
RootMe TryHackMe: WriteUp
Medium
RootMe TryHackMe: WriteUp
Task 1: Deploy the machine:-
hack and bug bounty
Unlocking the Secrets of ‘ROOTMe’: My TryHackMe Journey
Medium
Unlocking the Secrets of ‘ROOTMe’: My TryHackMe Journey
I started off my experience with ‘ROOTMe’ as an assignment, but it turned into fun and learning! As I delved deeper into the challenges, I…
hack and bug bounty
Common Ethical Hacking Techniques Explained: How They Help Uncover Vulnerabilities
Medium
Common Ethical Hacking Techniques Explained: How They Help Uncover Vulnerabilities
In a world where cyber threats are becoming increasingly sophisticated and pervasive, the importance of cybersecurity cannot be overstated…
hack and bug bounty
BAC — Bozuk Erişim Kontrolü Nedir? — A01:2021
Medium
BAC — Bozuk Erişim Kontrolü Nedir? — A01:2021
Bu yazıda erişim kontrolü kavramını ve “bozuk erişim kontrolü” zafiyetini basitleştirilmiş örneklerle inceleyeceğiz.
hack and bug bounty
Web Sockets in Web App Penetration Testing | 2023
Medium
Web Sockets in Web App Penetration Testing | 2023
In this section, we’ll explain what Web sockets is, describe some types, explain how to find and exploit various kinds of Web sockets and…
hack and bug bounty
Password-less Authentication
Medium
Password-less Authentication
What it is, how it works and what it solves…
hack and bug bounty
Ethical Hacking Mastery: A Year-Long Journey from Beginner to Expert.
Medium
Ethical Hacking Mastery: A Year-Long Journey from Beginner to Expert.
A 12-month roadmap for beginners looking to become ethical hackers is an extended plan that allows for a more in-depth exploration of the…
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, October 29, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, October 29, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Rootme write-up (Try Hack Me)
Medium
Rootme write-up (Try Hack Me)
Introduction
hack and bug bounty
Hack Social Media Using these 3technologies.
Medium
Hack Social Media Using these 3technologies.
Social Media has an deep impact on the life of an individual with an personal and social life. It promotes social life of an individual and…
hack and bug bounty
The Hacker’s Half-Year: A 6-Month Adventure in Security.
Medium
The Hacker’s Half-Year: A 6-Month Adventure in Security.
Studying Ethical Hacking requires dedication and a systematic approach. Keep in mind that the number of days you allocate to each task can…
hack and bug bounty
Unearthing Metabase’s Secrets: A Deep Dive into Remote Code Execution | HackTheBox Analytics…
Medium
Unearthing Metabase’s Secrets: A Deep Dive into Remote Code Execution | HackTheBox Analytics…
Once upon a time in the clandestine world of ethical hacking and cybersecurity, a talented hacker known as Alex was searching for a new…
hack and bug bounty
Understanding Firewalls in Network Security
Medium
Understanding Firewalls in Network Security
of bob218
hack and bug bounty
XSS on the Oauth callback URL with CSP bypass leading to zero-click account takeover
Medium
XSS on the Oauth callback URL with CSP bypass leading to zero-click account takeover
XSS on OAuth callback URL. Weaponizing the issue allowed zero-click account takeover.
hack and bug bounty
ChatGPT: The Ultimate Tool for Penetration Testers — SecurityCipher
Medium
ChatGPT: The Ultimate Tool for Penetration Testers — SecurityCipher
As a penetration tester or bug bounty hunter, you know the importance of having the right tools at your disposal. ChatGPT is a powerful AI…
hack and bug bounty
BBP#1 (BugBountyProgram Story) Zolo
Medium
BBP#1 (BugBountyProgram Story) Zolo
Story:
hack and bug bounty
Broken Object Level Authorization Vs. Broken Functionality Level Authorization | API Hacking |
Medium
Broken Object Level Authorization Vs. Broken Functionality Level Authorization | API Hacking |
In this blog, we will explore two significant security vulnerabilities: Broken Object Level Authorization (BOLA) and Broken Functionality…
hack and bug bounty
Mastering SQL Injection on DVWA Low Security with Burp Suite: A Comprehensive Guide — StackZero
Medium
Mastering SQL Injection on DVWA Low Security with Burp Suite: A Comprehensive Guide — StackZero
Master DVWA SQL injection on low-security with our Burp Suite tutorial. Dive into efficient cybersecurity techniques today.
hack and bug bounty
Disclosure email address of any Wordpress user via redacted-service
Medium
Disclosure email address of any Wordpress user via redacted-service
Hello fellas, in this write-up, I’m gonna talk about disclosing email address of any WordPress user by using an another service within…
hack and bug bounty
$1000 Bug using simple Graphql Introspection query
Medium
$1000 Bug using simple Graphql Introspection query
Welcome to my blog! In this post, I will be discussing my experience in the security testing of an application’s implementation of…