hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
CRITICAL BUG Alert: How I HACKED into a company’s DATABASE
Medium
CRITICAL BUG Alert: How I HACKED into a company’s DATABASE
First off, I want to say a big thank you for the incredible support on my first blog. I really appreciate it. If you haven’t had a chance…
hack and bug bounty
“Machine Learning Marvels How AI is Reshaping Data Science”
Medium
“Machine Learning Marvels How AI is Reshaping Data Science”
The field of data science has undergone a remarkable transformation in recent years, thanks to the advent of Artificial Intelligence (AI)…
hack and bug bounty
How I Hacked a Domain Controller in 3 Easy Steps
Medium
How I Hacked a Domain Controller in 3 Easy Steps
Sometimes getting the keys to the kingdom is too easy and can have devastating consequences if it gets into the hands of the wrong people…
hack and bug bounty
What is HATEOAS and why is it important for RESTful APIs?
Medium
What is HATEOAS and why is it important for RESTful APIs?
HATEOAS stands for Hypermedia as the Engine of Application State. It is one of the constraints of the REST architectural style that defines…
hack and bug bounty
A Million Journey
Medium
A Million Journey
How I Become a Millionaire
hack and bug bounty
Android Hacking Masterclass | The only guide you need to secure your android apps
Medium
Android Hacking Masterclass | The only guide you need to secure your android apps
In the ever-evolving world of mobile app development, one aspect remains a constant concern: security. As the Android platform continues to…
hack and bug bounty
“Data Science and the Future of Work Skills You Need to Stay Relevant”
Medium
“Data Science and the Future of Work Skills You Need to Stay Relevant”
The world is undergoing a profound digital transformation, and data science is at the forefront of this revolution. As businesses and…
hack and bug bounty
“Big Data, Big Impact How Data Science is Transforming Industries”
Medium
“Big Data, Big Impact How Data Science is Transforming Industries”
In the age of digital transformation, data has become one of the most valuable assets for businesses across various industries. The…
hack and bug bounty
“The Role of Data Science in Healthcare Revolutionizing Patient Care”
Medium
“The Role of Data Science in Healthcare Revolutionizing Patient Care”
In the ever-evolving landscape of healthcare, data science has emerged as a transformative force, reshaping the way we approach patient…
hack and bug bounty
17.1 Lab: Manipulating WebSocket messages to exploit vulnerabilities 2023
Medium
17.1 Lab: Manipulating WebSocket messages to exploit vulnerabilities 2023
This online shop has a live chat feature implemented using WebSockets. Chat messages that you submit are viewed by a support agent in real…
hack and bug bounty
2FA Bypass: How not to implement two-factor authentication
Medium
2FA Bypass: How not to implement two-factor authentication
Two-factor authentication (2FA) is an important security measure that helps protect against unauthorized access to accounts and systems. It…
hack and bug bounty
Cyber Briefing: 2023.10.30
Medium
Cyber Briefing: 2023.10.30
👉
What’s happening in cybersecurity today? NGINX Ingress, Kubernetes, Hunters International, Hive Ransomware, GHOSTPULSE, MSIX, Windows…
hack and bug bounty
From Unauthenticated SQL Injection to Remote Command Execution (RCE)
Medium
From Unauthenticated SQL Injection to Remote Command Execution (RCE)
I’m back with another blog post discussing an SQL injection vulnerability that I found during one of my engagements. While SQL injection…
hack and bug bounty
Broken Access Control Leading to Privilege Escalation
Medium
Broken Access Control Leading to Privilege Escalation
Broken Access Control is the number one vulnerability on the OWASP top 10 list, and I understand why, almost every pentest I conduct I find…
hack and bug bounty
Code Review: How to Get Started
Medium
Code Review: How to Get Started
For you to move up the skill ladder when it comes to web application testing, I believe that learning how to read code and understand it…
hack and bug bounty
Pentest Reporting: “More time to Pwn less time to Doc”
Medium
Pentest Reporting: “More time to Pwn less time to Doc”
The writing of pentest reports can be time-consuming when done manually, and while I am sure we can all agree that this is the least fun…
hack and bug bounty
How to Fix Twitter Login Error
Medium
How to Fix Twitter Login Error
Twitter is one of the most popular social media platforms, with millions of users logging in daily to share their thoughts, connect with…
hack and bug bounty
Day 114 — Exploring Cyber Bug Bounty Programs
Medium
Day 114 — Exploring Cyber Bug Bounty Programs
Welcome to Day 114 of our 100+ days of Cyber Security journey. Today, we’re diving deep into the fascinating world of Bug Bounty Programs.
hack and bug bounty
Enter Your Subdomain And Please Don’t Kill Me — Hacking Insecure OAuth flows with “#”
Medium
Enter Your Subdomain And Please Don’t Kill Me — Hacking Insecure OAuth flows with “#”
Have you ever encountered an OAuth integration that will actually ask to yo input your a subdomain of a service you want to integrate with?
hack and bug bounty
5 Ways I Bypassed Your Web Application Firewall (WAF)
Medium
5 Ways I Bypassed Your Web Application Firewall (WAF)
Introduction