Category: Mix

Post header image
17
Mar
2023

eBay is port scanning visitors to their website – and they aren’t the only ones

There’s a story going around the internet about eBay port scanning its visitors without any permission or even indication that…

gpt-understanding-miessler-swoosh2-mj
17
Mar
2023

Yes, GPTs Actually Understand – Daniel Miessler

A 60-second argument and example showing that GPTs and LLMs are capable of true understanding Created/Updated: March 14, 2023 There…

Why do you Duplicate so much with Bug Bounties?
17
Mar
2023

Why do you Duplicate so much with Bug Bounties?

Why do you Duplicate so much with Bug Bounties? Source link

Bugcrowd Security Flash - Confluence Server Webwork OGNL Injection (CVE 2021-26084)
17
Mar
2023

Bugcrowd Security Flash – Confluence Server Webwork OGNL Injection (CVE 2021-26084)

Bugcrowd Security Flash – Confluence Server Webwork OGNL Injection (CVE 2021-26084) Source link

What’s the most profitable bug bounty Michael has reported?
17
Mar
2023

What’s the most profitable bug bounty Michael has reported?

What’s the most profitable bug bounty Michael has reported? Source link

Training XSS Muscles - Brute XSS
17
Mar
2023

Training XSS Muscles – Brute XSS

XSS is all about practice. It requires a lot of time to print in the mind all vectors, payloads and…

NahamCon – Trash the Cache Write-up (Web 1000)
17
Mar
2023

NahamCon – Trash the Cache Write-up (Web 1000)

I recently participated in the NahamCon CTF with the team Hacking for Soju. I was unable to complete this challenge…

17
Mar
2023

My paper to-do strategy | victoria.dev

Simplify your task management strategy with my favorite hardware: paper. Coding up a to-do app may be the Hello, World…

Alfred WebApp Payloads Demo (XSS & Reverse Shell Payloads!)
17
Mar
2023

Alfred WebApp Payloads Demo (XSS & Reverse Shell Payloads!)

Alfred WebApp Payloads Demo (XSS & Reverse Shell Payloads!) Source link

Information Security News Resources
17
Mar
2023

Information Security News Resources

A centralized way to consume your information security news, with a focus on web application security. Save time and effort,…

Exploiting Hardcoded Keys to achieve RCE in Yellowfin BI – Assetnote
17
Mar
2023

Exploiting Hardcoded Keys to achieve RCE in Yellowfin BI – Assetnote

At Assetnote, we often audit enterprise software source code to discover pre-authentication vulnerabilities. Yellowfin BI had significance to us because…

Your Java builds might break starting January 13th (no more repo access via HTTP)
17
Mar
2023

Your Java builds might break starting January 13th (if you haven’t yet switched repo access to HTTPS) – Alphabot Security

Summary This blog post is a reminder that you should make sure that all your builds in the Java ecosystem…