Category: Mix

Hacking or coding - Should you learn code before hacking? Detectify Labs
25
Mar
2023

Hacking or coding – Should you learn code before hacking? Detectify Labs

You will find a common pattern if you read blog posts or watch interviews with some of today’s top ethical…

DAST in staging environments
25
Mar
2023

DAST in staging issues – Detectify Blog

TL;DR: There is a common belief that when it comes to uncovering bugs in the DevSecOps cycle, catching things early…

Post header image
25
Mar
2023

Turkey Chili Recipe – nem.ec

I began with the following NY Times recipe, but modified it a lot for my tastes and ingredients I could…

boy-ai-response-shaping-miessler-mj
25
Mar
2023

Response Shaping: How to Move from AI “Prompts” to AI Whispering

How to get consistently high-quality results from the AIs you interact with Created/Updated: March 20, 2023 Interacting with AI just…

Hacking on Bug Bounties for a Living
25
Mar
2023

Hacking on Bug Bounties for a Living

Hacking on Bug Bounties for a Living Source link

What is bug bounty?
25
Mar
2023

What is bug bounty?

What is bug bounty? Source link

How do companies respond to 0days in 3rd party software?
25
Mar
2023

How do companies respond to 0days in 3rd party software?

How do companies respond to 0days in 3rd party software? Source link

There are better options for a privacy-respecting phone
25
Mar
2023

There are better options for a privacy-respecting phone

Meet the new, better Apple. Here’s how to choose your phone and set it up. Whether you think the news…

The Mr Robot "Hack Twitch" video
24
Mar
2023

The Mr Robot “Hack Twitch” video

The Mr Robot “Hack Twitch” video Source link

The Best Bug Bounty Recon Methodology
24
Mar
2023

The Best Bug Bounty Recon Methodology

My first introduction to reconnaissance was Jason Haddix’s Bug Bounty Hunters Methodology. It’s the de facto standard and is still…

Pre Auth Remote Command Execution (CVE-2022-36804) – Assetnote
24
Mar
2023

Pre Auth Remote Command Execution (CVE-2022-36804) – Assetnote

Often when performing application security research, we come across other researchers who have found critical vulnerabilities in software that can…

JSF based login
24
Mar
2023

Misconfigured JSF ViewStates can lead to severe RCE vulnerabilities

tl;dr ViewStates in JSF are serialized Java objects. If the used JSF implementation in a web application is not configured…