hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Hack the Box: Unveiling Oopsie
Medium
Hack the Box: Unveiling Oopsie
Starting Point — Tier 2 — Oopsie Lab
hack and bug bounty
Cybersecurity learning progress
Medium
Cybersecurity learning progress
Curious about ethical hacking? Here I am!
hack and bug bounty
Enhance Email Security and Configuration with the Email Best Practices Checker
Medium
Enhance Email Security and Configuration with the Email Best Practices Checker
Email is a ubiquitous communication channel for individuals and businesses, making it a prime target for cyberattacks. Protecting your…
hack and bug bounty
On Detection: Tactical to Functional
Medium
On Detection: Tactical to Functional
Part 10: The Case of the Implicit Process Create
hack and bug bounty
เลิกใช้ Basic Authentication ซะ! เพราะมันไม่ปลอดภัย
Medium
ถึงเวลาเลิกใช้ Basic Authentication แล้ว เพราะความปลอดภัยที่มีจำกัด
ในโลกออนไลน์ที่เต็มไปด้วยการพัฒนาอย่างไม่หยุดยั้งและภัยคุกคามทางไซเบอร์ที่เพิ่มขึ้นอย่างต่อเนื่อง…
hack and bug bounty
Practicing WireShark
Medium
Practicing WireShark
In this activity, we will be putting our Wireshark skills to the test by analyzing two PCAPs, which increase in difficulty.
hack and bug bounty
Unveiling Brainpan: A Comprehensive Guide to Penetrating and Exploiting Its Security Weaknesses…
Medium
Unveiling Brainpan: A Comprehensive Guide to Penetrating and Exploiting Its Security Weaknesses…
Pre-Reqs:
hack and bug bounty
Unmasking AWS Secrets: My Journey with Trufflehog and Enumerate-IAM for Bug Bounty Hunters
Medium
Unmasking AWS Secrets: My Journey with Trufflehog and Enumerate-IAM for Bug Bounty Hunters
Are you a bug bounty hunter on a mission to uncover vulnerabilities and secrets hidden within Amazon Web Services (AWS)? In the world of…
hack and bug bounty
Rethinking CISO Accountability: A Call for Balance in Cybersecurity Leadership
Medium
Rethinking CISO Accountability: A Call for Balance in Cybersecurity Leadership
A Reflection on Current Events and the Path Forward
hack and bug bounty
Automating CSRF Detection in WordPress Plugins with Semgrep
Medium
Automating CSRF Detection in WordPress Plugins with Semgrep
Introduction
hack and bug bounty
Hacking the Mr. Robot Room on TryHackMe: A Step-by-Step Guide
Medium
Hacking the Mr. Robot Room on TryHackMe: A Step-by-Step Guide
Join me on a thrilling cyber adventure as we dive into the “Mr. Robot” room on TryHackMe, an engaging and practical cybersecurity training…
hack and bug bounty
Hacking Azure Key Vault
Medium
Hacking Azure Key Vault
Exploring Authentication Problem
hack and bug bounty
TryHackMe —Weasel Walkthrough
Medium
TryHackMe —Weasel Walkthrough
I’ve learned a lot from the various free resources on the internet, and I often discover interesting things by reading walkthroughs written…
hack and bug bounty
DEV BLOG: Competing in the 2023 Individual Games at the National Cyber League
Medium
DEV BLOG: Competing in the 2023 Individual Games at the National Cyber League
Like any computer science student with a laser-focused passion for security, I became aggressively ready for the games at NCL, clearing my…
hack and bug bounty
SoSimple CTF Walkthrough
Medium
SoSimple CTF Walkthrough
SoSimple is a medium difficulty Linux box. Let’s get into it!
hack and bug bounty
My first step into Cyber Security:
Medium
My first step into Cyber Security:
In the world of technology, the transition from one field to another can often happen unexpectedly. My name is Pavan Kharche, and I was…
hack and bug bounty
ถึงเวลาเลิกใช้ Basic Authentication แล้ว เพราะความปลอดภัยที่มีจำกัด
Medium
ถึงเวลาเลิกใช้ Basic Authentication แล้ว เพราะความปลอดภัยที่มีจำกัด
ในโลกออนไลน์ที่เต็มไปด้วยการพัฒนาอย่างไม่หยุดยั้งและภัยคุกคามทางไซเบอร์ที่เพิ่มขึ้นอย่างต่อเนื่อง…
hack and bug bounty
Windows Active Directory Hacking Lab Setup — Part 1, Domain Controller
Medium
Windows Active Directory Hacking Lab Setup — Part 1, Domain Controller
This post will outline setting up a hacking lab for Active Directory Pentesting. Full disclosure, this lab is based off of the TCM…
hack and bug bounty
Reimagining PayPal’s Legacy: Elon Musk’s Vision for X as the Financial Powerhouse
Medium
Reimagining PayPal’s Legacy: Elon Musk’s Vision for X as the Financial Powerhouse
Elon’s intention for X is not just as another tech platform but as a centerpiece in the financial world. He envisions X handling not only…
hack and bug bounty
The Importance of Ethical Hacking in Ensuring Cybersecurity
Medium
The Importance of Ethical Hacking in Ensuring Cybersecurity
Introduction