Category: Mix
[tl;dr sec] #171 – AppSec and CloudSec Resilience, Audit Logs Wall of Shame, Compromised Cloud to Kubernetes Takeover
Hey there, I hope you’ve been doing well! Bingo with Flair 97% of Bingo games in America happen in a...
Read more →Interview with a bounty hunter – “I made 10k$!” – Virdoex_Hunter
Interview with a bounty hunter – “I made 10k$!” – Virdoex_Hunter Source link
Read more →information disclosure of another company bug on video.
HackerOne disclosed a bug submitted by manish_adz: https://hackerone.com/reports/1886143 – Bounty: $500 Source link
Read more →Instagram App Access Token – These aren’t the access_tokens you’re looking for
In Facebook Graph API as defined by the developer documentation, there are several access tokens, to authenticate against various API...
Read more →Is Apple deliberately killing our batteries?
Is Apple deliberately killing our batteries? Source link
Read more →Finding XSS on .apple.com and building a proof of concept to leak your PII information | by Sean (zseano)
Back in February of this year I hacked with members of BugBountyHunter.com on a public bug bounty program and we...
Read more →Blind SQL Injection at fasteditor.hema.com | by Jonathan Bouman
Proof of concept. The username of the database user starts with ‘hema’. BackgroundThese days almost every website uses a database....
Read more →Discovering a 16 Million Download/Week Node.js Package Zero Day for a Capture the Flag Challenge
GovTech’s Cyber Security Group recently organised the STACK the Flags Cybersecurity Capture-the-Flag (CTF) competition from 4th to 6th December 2020....
Read more →The $16,000 Dev Mistake. Hello all! | by Daniel Marte
Hello all! Its been a while since my last write up. As a-lot of you know, last year I joined...
Read more →Eliminating Authorization Vulnerabilities with Dacquiri | by d0nut
Over the last year I’ve taken a step away from my usual bug bounty work to focus more on building...
Read more →