hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
“Data Science and the Future of Work Skills You Need to Stay Relevant”
Medium
“Data Science and the Future of Work Skills You Need to Stay Relevant”
The world is undergoing a profound digital transformation, and data science is at the forefront of this revolution. As businesses and…
hack and bug bounty
“Big Data, Big Impact How Data Science is Transforming Industries”
Medium
“Big Data, Big Impact How Data Science is Transforming Industries”
In the age of digital transformation, data has become one of the most valuable assets for businesses across various industries. The…
hack and bug bounty
“The Role of Data Science in Healthcare Revolutionizing Patient Care”
Medium
“The Role of Data Science in Healthcare Revolutionizing Patient Care”
In the ever-evolving landscape of healthcare, data science has emerged as a transformative force, reshaping the way we approach patient…
hack and bug bounty
17.1 Lab: Manipulating WebSocket messages to exploit vulnerabilities 2023
Medium
17.1 Lab: Manipulating WebSocket messages to exploit vulnerabilities 2023
This online shop has a live chat feature implemented using WebSockets. Chat messages that you submit are viewed by a support agent in real…
hack and bug bounty
2FA Bypass: How not to implement two-factor authentication
Medium
2FA Bypass: How not to implement two-factor authentication
Two-factor authentication (2FA) is an important security measure that helps protect against unauthorized access to accounts and systems. It…
hack and bug bounty
Cyber Briefing: 2023.10.30
Medium
Cyber Briefing: 2023.10.30
👉
What’s happening in cybersecurity today? NGINX Ingress, Kubernetes, Hunters International, Hive Ransomware, GHOSTPULSE, MSIX, Windows…
hack and bug bounty
From Unauthenticated SQL Injection to Remote Command Execution (RCE)
Medium
From Unauthenticated SQL Injection to Remote Command Execution (RCE)
I’m back with another blog post discussing an SQL injection vulnerability that I found during one of my engagements. While SQL injection…
hack and bug bounty
Broken Access Control Leading to Privilege Escalation
Medium
Broken Access Control Leading to Privilege Escalation
Broken Access Control is the number one vulnerability on the OWASP top 10 list, and I understand why, almost every pentest I conduct I find…
hack and bug bounty
Code Review: How to Get Started
Medium
Code Review: How to Get Started
For you to move up the skill ladder when it comes to web application testing, I believe that learning how to read code and understand it…
hack and bug bounty
Pentest Reporting: “More time to Pwn less time to Doc”
Medium
Pentest Reporting: “More time to Pwn less time to Doc”
The writing of pentest reports can be time-consuming when done manually, and while I am sure we can all agree that this is the least fun…
hack and bug bounty
How to Fix Twitter Login Error
Medium
How to Fix Twitter Login Error
Twitter is one of the most popular social media platforms, with millions of users logging in daily to share their thoughts, connect with…
hack and bug bounty
Day 114 — Exploring Cyber Bug Bounty Programs
Medium
Day 114 — Exploring Cyber Bug Bounty Programs
Welcome to Day 114 of our 100+ days of Cyber Security journey. Today, we’re diving deep into the fascinating world of Bug Bounty Programs.
hack and bug bounty
Enter Your Subdomain And Please Don’t Kill Me — Hacking Insecure OAuth flows with “#”
Medium
Enter Your Subdomain And Please Don’t Kill Me — Hacking Insecure OAuth flows with “#”
Have you ever encountered an OAuth integration that will actually ask to yo input your a subdomain of a service you want to integrate with?
hack and bug bounty
5 Ways I Bypassed Your Web Application Firewall (WAF)
Medium
5 Ways I Bypassed Your Web Application Firewall (WAF)
Introduction
hack and bug bounty
What is a Self Signed Certificate? How to Create a Self Signed Certificate Using OpenSSL?
Medium
What is a Self Signed Certificate? How to Create a Self Signed Certificate Using OpenSSL?
Secure communication over the internet relies on two critical components — encryption and authentication. Encryption protects data from…
hack and bug bounty
Why Browser Password Managers Can’t be Trusted
Medium
Why Browser Password Managers Can’t be Trusted
We have online accounts for almost everything in our lives, from banking to schooling, to medical services, entertainment, shopping, social…
hack and bug bounty
Android Deep Links exploitation
Medium
Android Deep Links exploitation
Recently, I have been studying Android penetration testing, and I came across a new topic called ‘Deep Links’. Since it is a new topic to…
hack and bug bounty
Unleashing the Power of Metasploit
Medium
Unleashing the Power of Metasploit
In the ever-evolving world of cybersecurity, both offensive and defensive tactics are constantly advancing. In the realm of offensive…
hack and bug bounty
Bootloader unlocking | Pre-requisites of rooting an Android Device
Medium
Bootloader unlocking | Pre-requisites of rooting an Android Device
What is Bootloader Unlock?
hack and bug bounty
Rooting AVD devices.
Medium
Rooting AVD devices.
This blog post was in my draft for a very long time and might be helpful for a few of you. I didn’t make any changes. Here it is.