Category: Mix

Instagram App Access Token - These aren't the access_tokens you're looking for
13
Mar
2023

Instagram App Access Token – These aren’t the access_tokens you’re looking for

In Facebook Graph API as defined by the developer documentation, there are several access tokens, to authenticate against various API…

Build, Break, and Hack WebSockets
13
Mar
2023

Build, Break, and Hack WebSockets

Build, Break, and Hack WebSockets Source link

Is Apple deliberately killing our batteries?
13
Mar
2023

Is Apple deliberately killing our batteries?

Is Apple deliberately killing our batteries? Source link

Finding XSS on .apple.com and building a proof of concept to leak your PII information | by Sean (zseano)
13
Mar
2023

Finding XSS on .apple.com and building a proof of concept to leak your PII information | by Sean (zseano)

Back in February of this year I hacked with members of BugBountyHunter.com on a public bug bounty program and we…

Blind SQL Injection at fasteditor.hema.com | by Jonathan Bouman
12
Mar
2023

Blind SQL Injection at fasteditor.hema.com | by Jonathan Bouman

Proof of concept. The username of the database user starts with ‘hema’. BackgroundThese days almost every website uses a database….

Discovering a 16 Million Download/Week Node.js Package Zero Day for a Capture the Flag Challenge
12
Mar
2023

Discovering a 16 Million Download/Week Node.js Package Zero Day for a Capture the Flag Challenge

GovTech’s Cyber Security Group recently organised the STACK the Flags Cybersecurity Capture-the-Flag (CTF) competition from 4th to 6th December 2020….

The $16,000 Dev Mistake. Hello all! | by Daniel Marte
12
Mar
2023

The $16,000 Dev Mistake. Hello all! | by Daniel Marte

Hello all! Its been a while since my last write up. As a-lot of you know, last year I joined…

Eliminating Authorization Vulnerabilities with Dacquiri | by d0nut
12
Mar
2023

Eliminating Authorization Vulnerabilities with Dacquiri | by d0nut

Over the last year I’ve taken a step away from my usual bug bounty work to focus more on building…

Hacking Pulse Secure for Redteaming
12
Mar
2023

Hacking Pulse Secure for Redteaming

This write-up is the collective efforts of collaborating with various hackers on exploring and furthering research that was presented by…

Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies
12
Mar
2023

Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies

The Story of a Novel Supply Chain Attack Continue reading on Medium » Source link

How to turn bugs into a "passive" income stream! ft Detectify's Almroot
12
Mar
2023

How to turn bugs into a “passive” income stream! ft Detectify’s Almroot

How to turn bugs into a “passive” income stream! ft Detectify’s Almroot Source link

Zoom Whiteboard
12
Mar
2023

I Hope This Sticks: Analyzing ClipboardEvent Listeners for Stored XSS

When is copy-paste payloads not self-XSS? When it’s stored XSS. Recently, I reviewed Zoom’s code to uncover an interesting attack…