Category: Mix

http://i.imgur.com/YGhvYJf.png
27
Jan
2025

Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)

Exploiting Markdown Syntax Markdown is wonderful. In fact, this blog post itself is written in Markdown. I don’t need to…

Abusing URL Shortners to discover sensitive resources or assets
27
Jan
2025

Abusing URL Shortners to discover sensitive resources or assets

September 23 2015 · websec bruteforce As of late, a fair few companies and startups have been using dedicated URL…

Hackerone logo
27
Jan
2025

Measure Your AI Risk Preparedness with This Interactive Self-Assessment Tool

Effectively managing these risks requires human expertise and strategic oversight. That’s where the AI Risk Readiness Self-Assessment Tool comes in —…

Using ngrok to proxy internal servers in restrictive environments
27
Jan
2025

Using ngrok to proxy internal servers in restrictive environments

When gaining shell access to a machine on a network, a promising attack vector is to check the internal network…

Gaining access to Uber's user data through AMPScript evaluation
27
Jan
2025

Gaining access to Uber’s user data through AMPScript evaluation

Modern development and infrastructure management practices are fast paced and constantly evolving. In the race to innovate and expand, new…

Hackerone logo
26
Jan
2025

European Council Adopts Cyber Resilience Act

The CRA will be a game-changing regulation for software and connected product security. The CRA imposes cybersecurity requirements for manufacturers…

Discovering a zero day and getting code execution on Mozilla's AWS Network
26
Jan
2025

Discovering a zero day and getting code execution on Mozilla’s AWS Network

When Assetnote Continuous Security (CS) monitors your attack surface, one of the things it looks for are instances of WebPageTest….

Hackerone logo
26
Jan
2025

How To Use HackerOne’s Global Vulnerability Policy Map

To help organizations keep up with the shifting landscape of VDP mandates and recommendations, HackerOne has developed the Global Vulnerability…

Finding Hidden Files and Folders on IIS using BigQuery
26
Jan
2025

Finding Hidden Files and Folders on IIS using BigQuery

Motivations I recently made a video on how to find hidden files and folders on IIS through the use of…

Hackerone logo
26
Jan
2025

Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen

The file upload vulnerability type is as broad in scope as the number of different file types. These vulnerabilities are…

Hackerone logo
26
Jan
2025

OWASP Top 10: The Risk of Cryptographic Failures

What Is Cryptography? Cryptography is the practice and study of techniques for securing communication and information by transforming it into…

Hackerone logo
26
Jan
2025

AWS Security Configuration Review and Best Practices

In fact, the Cloud Security Alliance’s Top Threats to Cloud Computing 2024 Report ranks the following concerns as the top three:…