XSS To Good XSS With ClickJacking on Subdomain Microsoft
https://link.medium.com/4EXo7G8Sk1
#XSS
#ClickJacking
#BugBounty
https://link.medium.com/4EXo7G8Sk1
#XSS
#ClickJacking
#BugBounty
Medium
XSS To Good XSS With ClickJacking on Subdomain Microsoft
Bismillah hirrahman nirrahim.
Open-redirect on Facebook (Bypass Linkshim)
https://noobsec.org/project/2020-02-16-open-redirect-on-facebook/
https://noobsec.org/project/2020-02-16-open-redirect-on-facebook/
Bypassing WAFs and cracking XOR with Hackvertor
https://portswigger.net/research/bypassing-wafs-and-cracking-xor-with-hackvertor
https://portswigger.net/research/bypassing-wafs-and-cracking-xor-with-hackvertor
Multiple sites for Obfuscation or JavaScript code obscurity.
http://utf-8.jp/public/aaencode.html
http://utf-8.jp/public/jjencode.html
http://www.jsfuck.com
#JS
#OBF
http://utf-8.jp/public/aaencode.html
http://utf-8.jp/public/jjencode.html
http://www.jsfuck.com
#JS
#OBF
“Undetectable C# & C++ Reverse Shells” by Bank Security https://link.medium.com/kIIc9Ch5b4
Medium
Undetectable C# & C++ Reverse Shells
Technical overview of different way to spawn a reverse shell on a victim machine
■■■□□ From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
Medium
From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
How I Finally could Got into an Internal Network (and could accessing all of their internal assets) by Using Various Vulnerabilities.
Source Code + Sensitive Information Disclosure lead to InstaMoney and SendGrind Account Takeover
https://medium.com/@denypradana/source-code-sensitive-information-disclosure-lead-to-instamoney-and-sendgrind-account-takeover-fc9adf7d8501
https://medium.com/@denypradana/source-code-sensitive-information-disclosure-lead-to-instamoney-and-sendgrind-account-takeover-fc9adf7d8501
Fun with Amazon S3— Leaks and bucket takeover attack
https://medium.com/@woj_ciech/fun-with-amazon-s3-leaks-and-bucket-takeover-attack-ddb17da1c431
https://medium.com/@woj_ciech/fun-with-amazon-s3-leaks-and-bucket-takeover-attack-ddb17da1c431
Medium
Fun with Amazon S3— Leaks and bucket takeover attack
Amazon S3 joins to the LeakLooker family, now tool looks for exposed buckets and potential takeovers.
[ Writeup — Bugbounty Facebook ] Disclosure the verified phone number in Checkpoint.
https://medium.com/@tiendat253/writeup-bugbounty-facebook-disclosure-the-verified-phone-number-in-checkpoint-aa652faeaf21
https://medium.com/@tiendat253/writeup-bugbounty-facebook-disclosure-the-verified-phone-number-in-checkpoint-aa652faeaf21
HOW I BYPASSED 2 FACTOR AUTHENTICATION
https://medium.com/@manralhemant10/how-i-bypassed-2-factor-authentication-899750421331
https://medium.com/@manralhemant10/how-i-bypassed-2-factor-authentication-899750421331
Medium
HOW I BYPASSED 2 FACTOR AUTHENTICATION
INTRODUCTION:
“Recon Everything” by SACHIN GROVER https://link.medium.com/ReykAnzk23
Medium
Recon Everything
Bug Bounty Hunting Tip #1- Always read the Source Code
ExploitHub pinned «“Recon Everything” by SACHIN GROVER https://link.medium.com/ReykAnzk23»