Hossein Shourabiscript.hashnode.dev·Sep 8, 2024Self-XSS to ATO via Site FeaturesHey guys, I hope you are well. First, I want to thank you for sharing your love for my waybackurl extension and for starring the "small tools for hackers" on GitHub. In this article, I want to share a cool self-XSS that I escalated to an account take...Discuss·1 like·92 readsSecuritySecurity
0xryzn1ghtm4r3.hashnode.dev·Sep 3, 2024The Bug Bounty Cartel Stories: Reviewing the First 3 WeeksMy Story : A Cybersecurity Enthusiast's Journey My name is Reyad, also known as N1ghtm4r3, born and raised in Egypt. I'm a recent Computer Science graduate, and for the past two and a half years, I've been diving deep into Cybersecurity, focusing on ...Discuss·152 readsThe Bug Bounty Cartel Storiesbugbounty
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Aug 26, 2024File Upload VulnerabilitiesFile upload vulnerabilities can lead to severe security breaches if not handled properly. Attackers can exploit insecure file uploads to upload malicious files that, when executed, can give them unauthorized access to the server. This is especially d...Discuss·592 readsDevops
Salik Seraj Naikcodewithssn.hashnode.dev·Aug 17, 2024Top Cybersecurity Project Ideas to Boost Your SkillsTop Cybersecurity Project Ideas to Boost Your Skills Cybersecurity is a rapidly evolving field, and hands-on projects are one of the best ways to deepen your understanding and gain practical experience. Whether you're a student, a professional, or an...Discussprojects ideas for cyber security
Blake JacobsforDorki - Blogdorki.hashnode.dev·Aug 14, 2024Your Data, Your Control: See How We've Made Privacy Unbreakable with Full Encryption!The article recounts the tumultuous journey of Dorki, a startup focused on creating a unique search engine, which faced a significant setback due to the betrayal of a team member. Despite the resultant challenges, including attempted theft and manipu...Discuss·139 reads#cybersecurity
Salik Seraj Naikcodewithssn.hashnode.dev·Aug 12, 2024Computer Networking: From Basics to Advanced1. Introduction to Computer Networking 1.1 What is Computer Networking? A computer network is a group of interconnected devices that communicate with each other to share resources and data. These networks can be as small as two computers in a home or...Discuss·1 like·37 readscomputer networking
Lohith Gowda Mblog.lohigowda.in·Aug 12, 2024Git Exposure: How a Simple Oversight Led to a Critical Security FlawIn my recent exploration of web applications, I came across a significant security issue that I believe deserves attention. This discovery involved a popular application responsible for managing various user services. While I can't divulge the applic...Discuss·1 like·352 readsappsec
Retr0forR3tr0's blogretr0x.hashnode.dev·Aug 12, 2024New Reconnaissance Methodologies/Tools for Bug Bounty Hunting & Ethical Hacking 💥💥Welcome Readers!! With new methodologies constantly emerging in the field of ethical hacking and bug bounty hunting, it's essential to explore the latest and most effective techniques. In this blog, we'll delve into some of the most innovative and t...Discuss·27 readssundomain enumeration
Ananya Chatterjeedevelover.hashnode.dev·Jul 30, 2024My bug bounty methodology and how I approach a targetHow I choose a bug bounty program , let’s assume you have received some private invitations. How would you choose between them? What program would you pick to start hunting for bugs? On HackerOne where I primarily hunt for bugs, I choose a program ba...Discuss·1 likeBug Bounty#cybersecurity
Reza RashidiforRedTeamReciperedteamrecipe.com·Jul 25, 2024RedTeam Story #1: XSS, LFI, LogrotateMITRE ATT&CK Techniques and Tactics Tactic: Reconnaissance Technique ID: T1595 Attack Context Reconnaissance is the phase where the attacker gathers information about the target system. This phase is critical for understanding the system's struct...Discuss·725 readsredteamstory