XploitCorexploitcore.hashnode.dev·Feb 4, 2025Report Vulnerabilities Like a Pro: The Ultimate Bug Bounty Hunting Guide (2025 Edition)Bug bounty hunting is one of the most rewarding skills in cybersecurity. Ethical hackers can discover vulnerabilities, enhance security, and earn significant rewards. This guide will provide a deep dive into finding, exploiting, and reporting vulnera...Ethical Hacking
XploitCorexploitcore.hashnode.dev·Feb 3, 2025The Ultimate Bug Bounty Hunting Guide (2025 Edition)Introduction Bug bounty hunting has emerged as one of the most exciting and financially rewarding fields in cybersecurity. As organizations invest more in securing their digital assets, ethical hackers have a golden opportunity to identify vulnerabil...bugbounty
Sreedeep cvsreedeep.hashnode.dev·Jan 22, 2025How to Protect Private npm Packages from Dependency ConfusionWhen downloading and using a package from any of the sources(npm, pip etc), you are essentially trusting its publisher to run code on your machine. So can this blind trust be exploited by malicious actors? This question gave rise to a new attack vect...10 likesnpm
Mehdi Ghodratipentestkit.hashnode.dev·Jan 3, 2025Bug Bounty zeroEmbarking on a bug bounty journey is both exciting and daunting. As a beginner, I find myself standing at the crossroads of curiosity and challenge, eager to explore the vast world of cybersecurity and ethical hacking. This blog post marks the beginn...bugbounty
Karan Bhardascarcemrk.hashnode.dev·Jan 1, 2025From Bug Bounties to Smart Contract Audits: My Path in Web3 SecurityHow I Started My Journey in Web3 Security Hello Readers, I’m Karan Bharda from India. I’m the founder of PinakShield and a Web3 Security Trainer at TheCyberBoy. I love Web3 security, and in this blog, I’ll share how I started my journey in Web3, when...1 like·45 readsWeb3 Journey
0xryzn1ghtm4r3.hashnode.dev·Dec 26, 2024Bug Bounty Cartel Stories - December EditionWelcome to the December Edition of the Bug Bounty Cartel Stories This month has been an incredible journey, filled with numerous challenges, valuable lessons, and, of course, a lot of bugs! From the 7th of last month to the 15th of this month, I deci...3 likes·87 readsThe Bug Bounty Cartel Stories#cybersecurity
peterbstyle - Blogkeys-to-cyber-security.hashnode.dev·Dec 22, 2024How to get started with Bug-BountyBug bounty hunting is a rewarding field where ethical hackers/ researchers help organizations identify and fix security vulnerabilities. As a beginner, stepping into this domain can seem overwhelming, but with the right approach, you can start your j...#cybersecurity
FIKARA BILALblog.fikara.io·Dec 17, 2024Subdomain EnumerationSubdomain research allows the identification of subdomains linked to a main domain that could be vulnerable, thus serving as entry points for misconfigured services. Discovering subdomains helps gather information about the technologies and configura...subdomain discovery
Itay Mlilbullet.hashnode.dev·Dec 15, 2024Cache Poisoning Leads To DOS On A Customer Service ChatHey everyone, Today, I will talk about a cache poisoning vulnerability that led to DOS on a company customer service chat. First of all, lets discuss on what is a web Cache and how it works (credit to https://portswigger.net/web-security/web-cache-po...47 readsweb cache poisoning
FIKARA BILALblog.fikara.io·Dec 10, 2024BugBountyCollecte d’informations Dans un contexte de BugBounty ou de test de sécurité, la collecte d’informations est une étape qui consiste à recueillir un maximun de données sur une cible. Le but est de mieux comprendre son environnement et surtout identifi...38 readsbugbounty