Category: Mix

facts: Bug Bounty hunters has made ridiculous amounts of $$ from known DNS techniques..
23
Mar
2023

facts: Bug Bounty hunters has made ridiculous amounts of $$ from known DNS techniques..

facts: Bug Bounty hunters has made ridiculous amounts of $$ from known DNS techniques.. Source link

OAuth Login
23
Mar
2023

Solving DOM XSS Puzzles | Spaceraccoon’s Blog

DOM-based Cross-site scripting (XSS) vulnerabilities rank as one of my favourite vulnerabilities to exploit. It’s a bit like solving a…

Gaining access to Uber's user data through AMPScript evaluation – Assetnote
23
Mar
2023

Gaining access to Uber’s user data through AMPScript evaluation – Assetnote

Modern development and infrastructure management practices are fast paced and constantly evolving. In the race to innovate and expand, new…

Abusing internal API to achieve IDOR in New Relic
23
Mar
2023

Abusing internal API to achieve IDOR in New Relic

I recently found a nice insecure direct object reference (IDOR) in New Relic which allowed me to pull data from…

Don’t Force Yourself to Become a Bug Bounty Hunter
23
Mar
2023

Don’t Force Yourself to Become a Bug Bounty Hunter

Ever since I was a kid I was never good at doing schoolwork. I had envied everyone that seemed to…

Serverless Toolkit for Pentesters - ropnop blog
23
Mar
2023

Serverless Toolkit for Pentesters – ropnop blog

Serverless is awesome and I can’t believe this stuff is free. I’m releasing some serverless functions that I’ve developed over…

[Uber] redirect_uri is difficult to do it right – Ron Chan
23
Mar
2023

[Uber] redirect_uri is difficult to do it right – Ron Chan

I don’t have automation in my bug hunting, no sqlmap, sublist3r or jsparser. I tried, they just don’t work out…

Bug Bounties Using only Burp & Browser - 30 DAY RESULTS (UNEXPECTED)
23
Mar
2023

Bug Bounties Using only Burp & Browser – 30 DAY RESULTS (UNEXPECTED)

Bug Bounties Using only Burp & Browser – 30 DAY RESULTS (UNEXPECTED) Source link

Automate it! | Richard’s Infosec blog
23
Mar
2023

Automate it! | Richard’s Infosec blog

“If you are doing a task more than twice? Then, automate it!” I hear that phrase all the time, but…

Leaking data of millions and taking over any account · rez0
23
Mar
2023

Leaking data of millions and taking over any account · rez0

Hacking on a plane, by Midjourney AI This is a short write-up about how I could have accessed the personal…

I hacked Outlook and could've read all of your EMAILS!
23
Mar
2023

I hacked Outlook and could’ve read all of your EMAILS!

I hacked Outlook and could’ve read all of your EMAILS! Source link

Exploiting Acronis Cyber Backup for Fun and Emails – RCE Security
23
Mar
2023

Exploiting Acronis Cyber Backup for Fun and Emails – RCE Security

CVE-2020-16171: Exploiting Acronis Cyber Backup for Fun and Emails You have probably read one or more blog posts about SSRFs,…