hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Upcoming & Completed CTF Challenges 2023 — 2024
Medium
Upcoming & Completed CTF Challenges 2023 — 2024
I’m creating this blog to track my completed CTF’s between 2023 — 2024
hack and bug bounty
Best Ethical Hacking & Cybersecurity Courses in Kerala!
Medium
Best Ethical Hacking & Cybersecurity Courses in Kerala!
The Increase of Cyber Attacks leads to the Importance of Cybersecurity & Ethical Hacking. If you Are looking For the Best Ethical Hacking &…
hack and bug bounty
Exploring Ethical Hacking: A Comprehensive Guide
Medium
Exploring Ethical Hacking: A Comprehensive Guide
In today’s digital age, where data is the lifeblood of many industries, safeguarding sensitive information is paramount. This is where…
hack and bug bounty
TryHackMe CTF: Neighbour
Medium
TryHackMe CTF: Neighbour
Unveiling Vulnerabilities and Exploiting IODR in the Neighbough CTF Challenge
hack and bug bounty
Misconfiguration Leads to P1 XSS
Medium
Misconfiguration Leads to P1 XSS
Reflected XSS via Misconfiguration in Get Parameter
hack and bug bounty
5+All Security Resource Digest for 2023–10–31
Medium
5+All Security Resource Digest for 2023–10–31
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Manipulating PEB — Process Environment Block
Medium
Manipulating PEB — Process Environment Block
Hey there, folks! Today, we’re diving into a nitty-gritty world where digital trickery meets the guts of your computer. It’s all about…
hack and bug bounty
Cyber Briefing: 2023.10.31
Medium
Cyber Briefing: 2023.10.31
👉
What’s happening in cybersecurity today? Atlassian, Confluence, Wiki-Slack, BiBi-Linux, Israel, Ransomware, NetScaler, EleKtra-Leak…
hack and bug bounty
Mastering OWASP ZAProxy: Complete Tutorial and Practical Examples
Medium
Mastering OWASP ZAProxy: Complete Tutorial and Practical Examples
Welcome to our comprehensive tutorial on OWASP ZAProxy! In this video, we will take you through a detailed exploration of ZAProxy…
hack and bug bounty
Cyber Awareness Month: Day 25– Zero Trust
Medium
Cyber Awareness Month: Day 25– Zero Trust
Zero-trust is a relatively new security concept that is based on the principle “Never Trust, Always Verify.” With growing technology and…
hack and bug bounty
Elon Musk’s X Valued at Less Than Half Of Acquisition Price.
Medium
Elon Musk’s X Valued at Less Than Half Of Acquisition Price.
In a surprising turn of events, more than a year after billionaire Elon Musk acquired Twitter for a staggering $44 billion, the…
hack and bug bounty
Cyber Awareness Month: Day 26– Zero Trust Implementation
Medium
Cyber Awareness Month: Day 26– Zero Trust Implementation
How Does Zero Trust Work
hack and bug bounty
Critical Remote Code Execution Vulnerability in Mirth Connect Puts Healthcare Data at Risk…
Medium
Critical Remote Code Execution Vulnerability in Mirth Connect Puts Healthcare Data at Risk (CVE-2023–43208)
Mirth Connect, an open-source data integration platform used extensively across healthcare, contains a severe unauthenticated remote code…
hack and bug bounty
Hack the Box — Heist
Medium
Hack the Box — Heist
Paths: Intro to Dante
hack and bug bounty
Port 21 Exploit
Medium
Port 21 Exploit
🔍
🔎
HELLO there, I am back again with an technical blog — how to exploit open port or service of your target. In this blog I will share with…
hack and bug bounty
What is Insecure deserialization?
Medium
What is Insecure deserialization?
In this section, we’ll cover what insecure deserialization is and describe how it can potentially expose websites to high-severity attacks…
hack and bug bounty
Account pre-hijacking using auto login token
Medium
Account pre-hijacking using auto login token
Innocent legacy token used in one of the signup forms may wreak havoc when it’s not being properly managed.
hack and bug bounty
Day 7: SQL Injection: Understanding the Basics of Database Attacks
Medium
Day 7: SQL Injection: Understanding the Basics of Database Attacks
As we mark day 7 of 100 days of Cyber-Security challenge, we will be discussing what exactly is SQL Injection. In the ever-evolving…
hack and bug bounty
Protecting Yourself from Cell Phone Hackers
Medium
Protecting Yourself from Cell Phone Hackers
In today’s interconnected world, our cell phones have become an extension of ourselves. They hold our most precious information, from…
hack and bug bounty
InfoSecSherpa’s News Roundup for Tuesday, October 31, 2023
Medium
InfoSecSherpa’s News Roundup for Tuesday, October 31, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!