hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Mastering OWASP ZAProxy: Complete Tutorial and Practical Examples
Medium
Mastering OWASP ZAProxy: Complete Tutorial and Practical Examples
Welcome to our comprehensive tutorial on OWASP ZAProxy! In this video, we will take you through a detailed exploration of ZAProxy…
hack and bug bounty
Cyber Awareness Month: Day 25– Zero Trust
Medium
Cyber Awareness Month: Day 25– Zero Trust
Zero-trust is a relatively new security concept that is based on the principle “Never Trust, Always Verify.” With growing technology and…
hack and bug bounty
Elon Musk’s X Valued at Less Than Half Of Acquisition Price.
Medium
Elon Musk’s X Valued at Less Than Half Of Acquisition Price.
In a surprising turn of events, more than a year after billionaire Elon Musk acquired Twitter for a staggering $44 billion, the…
hack and bug bounty
Cyber Awareness Month: Day 26– Zero Trust Implementation
Medium
Cyber Awareness Month: Day 26– Zero Trust Implementation
How Does Zero Trust Work
hack and bug bounty
Critical Remote Code Execution Vulnerability in Mirth Connect Puts Healthcare Data at Risk…
Medium
Critical Remote Code Execution Vulnerability in Mirth Connect Puts Healthcare Data at Risk (CVE-2023–43208)
Mirth Connect, an open-source data integration platform used extensively across healthcare, contains a severe unauthenticated remote code…
hack and bug bounty
Hack the Box — Heist
Medium
Hack the Box — Heist
Paths: Intro to Dante
hack and bug bounty
Port 21 Exploit
Medium
Port 21 Exploit
🔍
🔎
HELLO there, I am back again with an technical blog — how to exploit open port or service of your target. In this blog I will share with…
hack and bug bounty
What is Insecure deserialization?
Medium
What is Insecure deserialization?
In this section, we’ll cover what insecure deserialization is and describe how it can potentially expose websites to high-severity attacks…
hack and bug bounty
Account pre-hijacking using auto login token
Medium
Account pre-hijacking using auto login token
Innocent legacy token used in one of the signup forms may wreak havoc when it’s not being properly managed.
hack and bug bounty
Day 7: SQL Injection: Understanding the Basics of Database Attacks
Medium
Day 7: SQL Injection: Understanding the Basics of Database Attacks
As we mark day 7 of 100 days of Cyber-Security challenge, we will be discussing what exactly is SQL Injection. In the ever-evolving…
hack and bug bounty
Protecting Yourself from Cell Phone Hackers
Medium
Protecting Yourself from Cell Phone Hackers
In today’s interconnected world, our cell phones have become an extension of ourselves. They hold our most precious information, from…
hack and bug bounty
InfoSecSherpa’s News Roundup for Tuesday, October 31, 2023
Medium
InfoSecSherpa’s News Roundup for Tuesday, October 31, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Hack the Box — Marketcap
Medium
Hack the Box — Marketcap
Paths: Prep for Dante
hack and bug bounty
ProdSec in the Age of AI
Medium
ProdSec in the Age of AI
Introduction
hack and bug bounty
Cyber Awareness Month: Day 27– Endpoint Detection & Response
Medium
Cyber Awareness Month: Day 27– Endpoint Detection & Response
A key cybersecurity solution that aids businesses in identifying and countering attacks on their endpoints — such as computers, laptops…
hack and bug bounty
DC-2 VulnHub Walkthrough
Medium
DC-2 VulnHub Walkthrough
The exciting sequel!
hack and bug bounty
Hack The Box — Gofer write-up
Medium
Hack The Box — Gofer write-up
This is a write-up for the “Gofer” machine on HackTheBox.
hack and bug bounty
Alert Fatigue Is a Security Issue
Medium
Alert Fatigue Is a Security Issue
Why this not-so-new term is more important to Application Security than you think
hack and bug bounty
Cyber Awareness Month: Day 28- Extended detection and response (XDR)
Medium
Cyber Awareness Month: Day 28- Extended detection and response (XDR)
Extended Detection and Response, commonly known as XDR provides context and visibility into sophisticated threats by gathering and…
hack and bug bounty
APACHE2 LOG POISONING AND LINUX PRIVILEGE ESCALATION
Medium
APACHE2 LOG POISONING AND LINUX PRIVILEGE ESCALATION
I will be using Solstice machine, u can find it in the link given below