Forwarded from Geek girl 👩💻
🛴 HTTP headers - resources and links 🛴
Understanding HTTP Basics
http://www.steves-internet-guide.com/http-basics/
Basics of HTTP (Very helpful resource)
https://developer.mozilla.org/en-US/docs/Web/HTTP/Basics_of_HTTP
HTTP Headers for Dummies
https://code.tutsplus.com/tutorials/http-headers-for-dummies--net-8039
Identifying resources on the Web
https://developer.mozilla.org/en-US/docs/Web/HTTP/Basics_of_HTTP/Identifying_resources_on_the_Web
Content negotiation
https://developer.mozilla.org/en-US/docs/Web/HTTP/Content_negotiation
Server-side website programming first steps
https://developer.mozilla.org/en-US/docs/Learn/Server-side/First_steps
●▬۩❁ @geeekgirls ❁۩▬●
Understanding HTTP Basics
http://www.steves-internet-guide.com/http-basics/
Basics of HTTP (Very helpful resource)
https://developer.mozilla.org/en-US/docs/Web/HTTP/Basics_of_HTTP
HTTP Headers for Dummies
https://code.tutsplus.com/tutorials/http-headers-for-dummies--net-8039
Identifying resources on the Web
https://developer.mozilla.org/en-US/docs/Web/HTTP/Basics_of_HTTP/Identifying_resources_on_the_Web
Content negotiation
https://developer.mozilla.org/en-US/docs/Web/HTTP/Content_negotiation
Server-side website programming first steps
https://developer.mozilla.org/en-US/docs/Learn/Server-side/First_steps
●▬۩❁ @geeekgirls ❁۩▬●
|
Introduction to HTTP : Understanding HTTP Basics
The HTTP protocol is the protocol that powers the web. It is also used in many IOT applications. In this tutorial series we take a look at how it works starting with the very basics
White House hosts tech summit to discuss open source security after Log4j
In the wake of the Log4j incident, business leaders from Apple, Google, Amazon, Meta, IBM, Microsoft, Oracle, GitHub, the Linux Open Source Foundation and the Apache Software Foundation met at the White House last week to discuss the security of open source software, which was deemed a “key national security concern” by national security advisor Jake Sullivan.
In the wake of the Log4j incident, business leaders from Apple, Google, Amazon, Meta, IBM, Microsoft, Oracle, GitHub, the Linux Open Source Foundation and the Apache Software Foundation met at the White House last week to discuss the security of open source software, which was deemed a “key national security concern” by national security advisor Jake Sullivan.
The Daily Swig | Cybersecurity news and views
White House tackles ‘unique security challenges’ faced by open source ecosystem during dedicated virtual summit
Silicon Valley giants joined government officials to thrash out remedies to software supply chain woes
Forwarded from SHADOW:Group
📮 Раскрытие токена доступа OAuth с помощью Open Redirect
Сам по себе Open Redirect обычно не принимается многими программами в Bug Bounty, однако бывают случаи, когда его можно использовать в связке и поднять импакт.
Например, с его помощью можно извлечь токен доступа OAuth, который в дальнейшем можно использовать для получения конфиденциальной информации.
Чтобы понять, как этого добиться, рекомендую посмотреть видео от команды Intigrity, в котором подробно рассказано о данной атаке, на примере лабы с Portswigger.
#web #oauth #leak
Сам по себе Open Redirect обычно не принимается многими программами в Bug Bounty, однако бывают случаи, когда его можно использовать в связке и поднять импакт.
Например, с его помощью можно извлечь токен доступа OAuth, который в дальнейшем можно использовать для получения конфиденциальной информации.
Чтобы понять, как этого добиться, рекомендую посмотреть видео от команды Intigrity, в котором подробно рассказано о данной атаке, на примере лабы с Portswigger.
#web #oauth #leak
YouTube
Open Redirect Leading to OAuth Access Token Disclosure!
👩🎓👨🎓 Learn about Open Redirect vulnerabilities. In this video, we are going to use an open redirect vulnerability and chain it with some others to extract an OAuth access token, which can be further used to obtain sensitive information.
Overview:
00:00…
Overview:
00:00…
https://howto.thec2matrix.com/
Golden Resource for Command and Control frameworks. Helpful for Red Team engagements and Purple Team Exercises
Golden Resource for Command and Control frameworks. Helpful for Red Team engagements and Purple Team Exercises
Thec2Matrix
The C2 Matrix | C2 Matrix
Welcome to the C2 Matrix!!
https://medium.com/@bxmbn/how-i-made-15-000-by-hacking-caching-servers-part-1-5541712a61c3
https://medium.com/@bxmbn/how-i-made-16-500-hacking-cdn-caching-servers-part-2-4995ece4c6e6
https://medium.com/@bxmbn/how-i-made-16-500-hacking-cdn-caching-servers-part-3-91f9d836e046
https://medium.com/@bxmbn/how-i-made-16-500-hacking-cdn-caching-servers-part-2-4995ece4c6e6
https://medium.com/@bxmbn/how-i-made-16-500-hacking-cdn-caching-servers-part-3-91f9d836e046
Medium
How I Made $16,500 Hacking CDN Caching Servers — Part 1
@bxmbn