Category: Mix

Detectify Blog - Here's how EASM fills gaps missed by AppSec solutions
29
Mar
2023

Detectify Blog – Here’s how EASM fills gaps missed by AppSec solutions

We recently explored why developers have begun to ship more frequently to production, as well the relationship between more frequent…

Post header image
29
Mar
2023

Discovering the IP address of a WordPress site hidden behind Cloudflare

Cloudflare is a company that provides domain name (DNS) services, Distributed Denial of Service (DDoS) protection, and a content delivery…

NO. 375 | 6 Post-GPT Phases, Github's Private Key, New Assistant Interfaces
29
Mar
2023

NO. 375 | 6 Post-GPT Phases, Github’s Private Key, New Assistant Interfaces

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | Ep. 375 |…

29
Mar
2023

🔴 Live Video Editing: Beginners Bug Bounty, Where to Begin

🔴 Live Video Editing: Beginners Bug Bounty, Where to Begin Source link

How does the internet work?
29
Mar
2023

How does the internet work?

How does the internet work? Source link

Saving time by automating bug bounty reports
29
Mar
2023

Saving time by automating bug bounty reports

Saving time by automating bug bounty reports Source link

Building in context | victoria.dev
28
Mar
2023

Building in context | victoria.dev

The best laid plans are made better by staying close to context. It’s a comedy classic – you’ve got a…

Essential Bug Bounty Books for Beginners and Pros
28
Mar
2023

Essential Bug Bounty Books for Beginners and Pros

These bug bounty hunting books come recommended by top bug bounty hunters and hackers. Most of them cover web applications,…

Abusing functionality to exploit a super SSRF in Jira Server (CVE-2022-26135) – Assetnote
28
Mar
2023

Abusing functionality to exploit a super SSRF in Jira Server (CVE-2022-26135) – Assetnote

TL;DR Jira is vulnerable to SSRF which requires authentication to exploit. There are multiple ways to create user accounts on…

POSTed JSON with HTTP Client
28
Mar
2023

How to configure Json.NET to create a vulnerable web API

tl;dr No, of course, you don’t want to create a vulnerable JSON API. So when using Json.NET: Don’t use another…

Binary Analysis and Debugging – allysonomalley.com
28
Mar
2023

Binary Analysis and Debugging – allysonomalley.com

This post is the 4th and final part a series giving an overview of the most useful iOS app pentesting…

GitLab - GitLab-Runner on Windows `DOCKER_AUTH_CONFIG` container host Command Injection
28
Mar
2023

GitLab – GitLab-Runner on Windows `DOCKER_AUTH_CONFIG` container host Command Injection

HackerOne bug report to GitLab: GitLab-Runner, when running on Windows with a docker executor, is vulnerable to Command Injection via…