hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Effective RBAC and least privilege using minimal resources.
Medium
Effective RBAC and least privilege using minimal resources.
Insider threat is one of the most sensitive and hardest security issue for organizations to prepare for as violations carried out by…
hack and bug bounty
Pass The Hash Attack
Medium
Pass The Hash Attack
PtH เป็นการโจมตีเครือข่ายประเภทหนึ่ง โดยผู้โจมตีจะขโมยรหัสผ่านของผู้ใช้ที่ถูกเข้ารหัส (password hash)…
hack and bug bounty
My personal collection for Pen testing and CyberNotes
Medium
My personal collection for Pen testing and CyberNotes
My Personols Noots so I dont forget |Pen Testing|
hack and bug bounty
The Hidden Dangers Lurking in Your Active Directory Certificate Services – What You Need to Know…
Medium
The Hidden Dangers Lurking in Your Active Directory Certificate Services – What You Need to Know…
Active Directory Certificate Services (AD CS) is a critical component within the Microsoft Windows Server ecosystem, providing Public Key…
hack and bug bounty
IWCON 0x03 is 13 Days Away
Medium
IWCON 0x03 is 13 Days Away
Have you reserved your seat yet?
hack and bug bounty
Cyber Briefing: 2023.12.04
Medium
Cyber Briefing: 2023.12.04
👉
What’s happening in cybersecurity today?
hack and bug bounty
“Cybersecurity by Design Integrating Security from the Start”
Medium
“Cybersecurity by Design Integrating Security from the Start”
In an era defined by digital innovation and connectivity, the imperative to prioritize cybersecurity has become a foundational element of…
hack and bug bounty
“Continuous Monitoring Staying Vigilant in the Cyber Battleground”
Medium
“Continuous Monitoring Staying Vigilant in the Cyber Battleground”
In the relentless realm of cybersecurity, where threats lurk in the shadows and the digital landscape is ever-changing, maintaining a…
hack and bug bounty
Advent of Cyber 2023 — Day 4 Writeup with Answers by Karthikeyan Nagaraj | TryHackMe
Medium
Advent of Cyber 2023 — Day 4 Writeup with Answers by Karthikeyan Nagaraj | TryHackMe
TryHackMe — Brute Forcing [ Baby, It’s CeWLd Outside ] — The team detects a malicious actor using an employee account to access an…
hack and bug bounty
Vulnerable WordPress November 2023 (Book of Dede Korkut)
Medium
Vulnerable WordPress November 2023 (Book of Dede Korkut)
Today, we see the release of various vulnerabilities in various programs. If you’re a security researcher, you’re probably tempted to work…
hack and bug bounty
Vulnerability Management with DefectDojo — is it great for DevSecOps?
Medium
Vulnerability Management with DefectDojo — is it great for DevSecOps?
Presenting capabilities of DefectDojo in context of Vulnerability Management for DevSecOps and traditional application security engineers.
hack and bug bounty
Javascript Analysis to SQL injection
Medium
Javascript Analysis to SQL injection
Hi Hackers, I’m Mostafa Elguerdawi.
hack and bug bounty
Defending Your Digital Fortress: Cloaked Wireless’s Unrivaled Shield Against SIM Swap Attacks
Medium
Defending Your Digital Fortress: Cloaked Wireless’s Unrivaled Shield Against SIM Swap Attacks
In the ever-evolving landscape of digital threats, SIM swap attacks have emerged as a significant concern, posing risks to user accounts…
hack and bug bounty
Guarding the Titans: Rising SIM Swap Attacks on Prominent Figures on Social Media
Medium
Guarding the Titans: Rising SIM Swap Attacks on Prominent Figures on Social Media
In the ever-expanding digital landscape, the rise of SIM swap attacks has become a formidable threat, particularly targeting vocal…
hack and bug bounty
web vulnerabilities scan with WMAP
Medium
web vulnerabilities scan with WMAP
WMAP (Web Application Mapping and Penetration Testing) is a module within the Metasploit Framework that is used to identify and exploit…
hack and bug bounty
Proving Grounds Practice — Billyboss
Medium
Proving Grounds Practice — Billyboss
This is an intermediate box on Offsec’s PG Practice but the community has rated it ‘Very Hard’.
hack and bug bounty
Try Hack me— Advent Of Cyber 2023 Day 4 Write Up — Baby, it’s CeWLd outside
Medium
Try Hack me— Advent Of Cyber 2023 Day 4 Write Up — Baby, it’s CeWLd outside
Room: Advent of Cyber 2023 Day 4
hack and bug bounty
Bug Hunter journal day #3 and #4
Medium
Bug Hunter journal day #3 and #4
Within the massive list of subdomains for my target, as mentioned earlier, I found some WordPress sites. even stumbled upon that CVE for user enumeration, but by now, it’s likely already been…
hack and bug bounty
SSL-Stripping Demonstration and Mitigation
Medium
SSL-Stripping Demonstration and Mitigation
Demonstration of SSL stripping and how to mitigate it by setting Strict Transport Security.
hack and bug bounty
Reconciling “Secure by Design” With National Security, According to CISA’s Eric Goldstein
Medium
Reconciling “Secure by Design” With National Security, According to CISA’s Eric Goldstein
How CISA’s “secure by design” is NOT hypocritical, despite agencies hording zero days — and what the campaign is REALLY trying to do.