hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Vulnerability Assessment vs. Penetration Testing: Understanding the Key Differences
Medium
Vulnerability Assessment vs. Penetration Testing: Understanding the Key Differences
In the realm of cybersecurity, two terms are often used interchangeably: vulnerability assessment and penetration testing. While both play…
hack and bug bounty
A Pentester’s Approach to Kubernetes Security — Part 1
Medium
A Pentester’s Approach to Kubernetes Security — Part 1
This is the first of a two-part blog series based on vulnerabilities we usually identify during Kubernetes Penetration Tests that we run…
hack and bug bounty
Maritime Communication : Decoding Navtex And Wefax Signals
Medium
Introduction to NAVTEX
Maritime communication relies on various systems and technologies to ensure the safety and efficiency of vessels at sea. Two key components in this realm are NAVTEX and Wefax NAVTEX, the Navigational…
hack and bug bounty
Unveiling the Cunning: A Demo of Google Calendar RAT Exploiting Calendar Service for C2 Operations
Medium
Unveiling the Cunning: A Demo of Google Calendar RAT Exploiting Calendar Service for C2 Operations
In a recent discovery that sounds more like Hollywood fiction than reality, attackers have been found using Google Calendar as a Command…
hack and bug bounty
Unlock Your Ethical Hacking Potential: Certified Ethical Hacker (CEH) Certification Requirements…
Medium
Unlock Your Ethical Hacking Potential: Certified Ethical Hacker (CEH) Certification Requirements Revealed! | Careervira
In this blog, we’ll break down the certified ethical hacker (CEH) certification requirements to obtain the CEH by EC Council.
hack and bug bounty
Decoding Ethical Hacking: Beginner’s Step-by-Step Handbook
Medium
Decoding Ethical Hacking: Beginner’s Step-by-Step Handbook
Curious about the world of ethical hacking? Ethical hacking involves using computer skills to find vulnerabilities in systems and enhance…
hack and bug bounty
Whispers of the Cybersphere: The Chronicles of Vulnerability — 35.193.216.79
Medium
Whispers of the Cybersphere: The Chronicles of Vulnerability — 35.193.216.79
Google Cloud is a comprehensive suite of cloud computing services offered by Google. It provides a variety of services for computing…
hack and bug bounty
A Comprehensive Guide to Detecting and Preventing SQL Injection Vulnerabilities
Medium
A Comprehensive Guide to Detecting and Preventing SQL Injection Vulnerabilities
SQL injection is a type of attack that occurs when an attacker inserts malicious SQL code into a web application’s input fields, tricking…
hack and bug bounty
I WANT TO HIRE A HACKER TO TRACK MY A STALKER / MISSING CELL PHONE
Medium
I WANT TO HIRE A HACKER TO TRACK MY A STALKER / MISSING CELL PHONE
In this day and time, stalkers or thieves who stalk offline are using technology to assist their behaviours for example, mobile phones, social media, computers, and geolocation tracking. This has…
hack and bug bounty
DRIFTING BLUES 6 WALKTHROUGH PROVING GROUNDS PLAY
Medium
DRIFTING BLUES 6 WALKTHROUGH PROVING GROUNDS PLAY
1)RECONNAISSANCE
hack and bug bounty
Empowering the $X Project with Artificial Intelligence: A Game-Changing Integration
Medium
Empowering the $X Project with Artificial Intelligence: A Game-Changing Integration
At the heart of the $X Project’s strategy and development lies an ambitious endeavor: integrating Artificial Intelligence (AI) into our…
hack and bug bounty
Zero to Hero Burp Suite Extension
Medium
Zero to Hero Burp Suite Extension
Web application security testing is of paramount importance in today’s digital world. Services and applications offered on the internet can…
hack and bug bounty
Mastering Cybersecurity: A Comprehensive Guide to Cybersecurity Certification
Medium
Mastering Cybersecurity: A Comprehensive Guide to Cybersecurity Certification
In an era dominated by digital advancements and interconnected systems, the need for robust cybersecurity measures has never been more…
hack and bug bounty
Is Cybersecurity Jobs Overcrowded in 2023? (My Current Situation)
Medium
Is Cybersecurity Jobs Overcrowded in 2023? (My Current Situation
😭
)
Hi, Ajak Amico’s welcome back to another blog. As I mentioned in the previous blog, I am currently searching for jobs in the UK for…
hack and bug bounty
TryHackMe-Alfred(WriteUp)
Medium
TryHackMe-Alfred(WriteUp)
Greetings People! I hope you’re all doing great. Another one in the writeups list after so long.
hack and bug bounty
CAPen Mock Exam Writeup
Medium
CAPen Mock Exam Writeup
There are four questions. They weren’t difficult, but I gained something interesting that I’d want to share, so let’s get started with the…
hack and bug bounty
Basic Bug Bounty Strategy
Medium
Basic Bug Bounty Strategy
Cross-Site Scripting (XSS)
hack and bug bounty
20.2 Lab: Host header authentication bypass | 2023
Medium
20.2 Lab: Host header authentication bypass | 2023
This lab makes an assumption about the privilege level of the user based on the HTTP Host header. To solve the lab, access the admin panel…
hack and bug bounty
ReversingLabs TitaniumCloud for Splunk SOAR Updates — v1.2.0
Medium
ReversingLabs TitaniumCloud for Splunk SOAR Updates — v1.2.0
Version 1.2.0 of ReversingLabs’ TitaniumCloud v2 app for Splunk SOAR adds new actions for network reputation lookups.
hack and bug bounty
Cybersecurity Top World Headlines ️
Medium
Cybersecurity Top World Headlines
📰
🛡️
Top cybersecurity headlines from around the globe