[Part 1] How to Hack Into Wi-Fi – Handshake Capturing
Pentesting is more than testing a software code. You can also test people for info extraction. Or hack into their wireless network!
Click here to learn about the handshake capturing
#article #tutorial
Pentesting is more than testing a software code. You can also test people for info extraction. Or hack into their wireless network!
Click here to learn about the handshake capturing
#article #tutorial
👍4🥰1
🔄 Bitmart has updated the bounty rewards!
New severity tiers are:
critical: $2000 - $5000
high: $800 - $2000
medium: $200 - $500
low: $50 - $150
In a nutshell:
- Almost all the minimum rewards have got bigger
- $2000 reward has been added on top of the most critical bugs
- Medium and low bug rewards have been balanced
Join the bounty hunt!
#updated_bounty
New severity tiers are:
critical: $2000 - $5000
high: $800 - $2000
medium: $200 - $500
low: $50 - $150
In a nutshell:
- Almost all the minimum rewards have got bigger
- $2000 reward has been added on top of the most critical bugs
- Medium and low bug rewards have been balanced
Join the bounty hunt!
#updated_bounty
❤3
📈 NEAR Protocol has set a new bug bounty reward record!
Earn $1 000 000 reward per critical vulnerability!
NEAR Protocol is a blockchain network with a Proof-of-Stake consensus algorithm. Instead of building layer 2, it relies on optimizing layer 1 using the sharding technology.
The only target is the blockchain code. And here's the NEAR whitepaper.
💸 Rewards:
- Critical: $500 000 - $1 000 000
- High: $100 000 - $200 000
- Medium: $5 000 - $20 000
- Low: $100 - $1 000
➡️ Click here to join the bug hunt
#new_bounty #breaking_record
Earn $1 000 000 reward per critical vulnerability!
NEAR Protocol is a blockchain network with a Proof-of-Stake consensus algorithm. Instead of building layer 2, it relies on optimizing layer 1 using the sharding technology.
The only target is the blockchain code. And here's the NEAR whitepaper.
💸 Rewards:
- Critical: $500 000 - $1 000 000
- High: $100 000 - $200 000
- Medium: $5 000 - $20 000
- Low: $100 - $1 000
➡️ Click here to join the bug hunt
#new_bounty #breaking_record
🤯4🥰2
👥 The referral program is live: get more rewards with your referrals!
Invite your friends to HackenProof to get rewarded for their bounties.
Click here to learn more about the referral program
#article
Invite your friends to HackenProof to get rewarded for their bounties.
Click here to learn more about the referral program
#article
❤1
[Part 2] How to Hack Into Wi-Fi – WPS Pixie Dust
Find out the most complicated Wi-Fi passwords by cracking their PINs.
Click here to learn more
#article #tutorial
Find out the most complicated Wi-Fi passwords by cracking their PINs.
Click here to learn more
#article #tutorial
❤5
🔄 CoinGecko has added 2 more bounty targets!
The new targets are CoinGecko terminal website and its API.
Continue the bounty hunt
#updated_bounty
The new targets are CoinGecko terminal website and its API.
Continue the bounty hunt
#updated_bounty
👍4
✅ ShapeShift has launched a bug bounty with up to $10 000 reward per critical vulnerability!
ShapeShift is a DAO of builders actively working to advance the state of crypto trading, investing, and access to open, decentralized financial systems.
There are 6 targets to scope:
- 3 Websites
- 2 API
- 1 Android app
Rewards:
- Critical: $5,000 – $10,000
- High: $2,000 – $5,000
- Medium: $500 – $1,500
- Low: $50 – $500
Click here to join the bug hunt
#new_bounty
ShapeShift is a DAO of builders actively working to advance the state of crypto trading, investing, and access to open, decentralized financial systems.
There are 6 targets to scope:
- 3 Websites
- 2 API
- 1 Android app
Rewards:
- Critical: $5,000 – $10,000
- High: $2,000 – $5,000
- Medium: $500 – $1,500
- Low: $50 – $500
Click here to join the bug hunt
#new_bounty
👍8
📋 Save these cybersec acronyms to use for your work!
Paul Baird - FCIIS has come up with an excellent idea for putting it as a periodic table.
And we’ve made a little visual overhaul to make it even better!
#infographic
Paul Baird - FCIIS has come up with an excellent idea for putting it as a periodic table.
And we’ve made a little visual overhaul to make it even better!
#infographic
👍7
📊 One Four security infographics – coming right up!
Check out how many Avalanche projects have been audited or published a bug bounty.
3 facts:
1. Almost 40% of the projects have either a bug bounty or an audit
2. Avalanche-supported wallets is the most secured category
3. Avalanche projects prefer a bug bounty over audits
Learn more about the research
#infographic #article #research
Check out how many Avalanche projects have been audited or published a bug bounty.
3 facts:
1. Almost 40% of the projects have either a bug bounty or an audit
2. Avalanche-supported wallets is the most secured category
3. Avalanche projects prefer a bug bounty over audits
Learn more about the research
#infographic #article #research
👍3
🔄 Allbridge has prolonged their bounty for one more year!
Allbridge is an expanding token bridge with on-chain consensus.
You can use it for sending ERC20, SPL, and many more tokens in a few clicks.
✊ Join the bounty hunt
#updated_bounty
Allbridge is an expanding token bridge with on-chain consensus.
You can use it for sending ERC20, SPL, and many more tokens in a few clicks.
✊ Join the bounty hunt
#updated_bounty
👍3
Media is too big
VIEW IN TELEGRAM
📺 Valentine Osnovyanenko has hosted the first HackenProof Podcast episode! Our first guest is Rostyslav Bortman – founder of Kyiv Ethereum Community and Head of Blockchain at IdeaSoft.
In the episode, we’ve discussed things like:
- Early Fall hacks
- Crypto mixers and NFTs
- The emergence of smart contract software
➡️ Watch the full episode here
#podcast #01
In the episode, we’ve discussed things like:
- Early Fall hacks
- Crypto mixers and NFTs
- The emergence of smart contract software
➡️ Watch the full episode here
#podcast #01
👍5🔥1
📺 What happened with the Mango hack?
Rostyslav Bortman is sharing his view:
- Basing token price on the DEX reserves creates a vulnerability
- It takes a whale trader to exploit a token pool with a reserve-based price
- Reversing the blockchain can only be done with community consent
➡️ Watch the full episode here
#podcast #02
Rostyslav Bortman is sharing his view:
- Basing token price on the DEX reserves creates a vulnerability
- It takes a whale trader to exploit a token pool with a reserve-based price
- Reversing the blockchain can only be done with community consent
➡️ Watch the full episode here
#podcast #02
👍6
Media is too big
VIEW IN TELEGRAM
📺 Projects make new tokens when the original one fails!
Rostyslav Bortman believes that’s not the solution.
➡️ Watch the full episode here
How should the projects deal with failed tokens? Share your thoughts in the comments
#podcast #01
Rostyslav Bortman believes that’s not the solution.
➡️ Watch the full episode here
How should the projects deal with failed tokens? Share your thoughts in the comments
#podcast #01
Media is too big
VIEW IN TELEGRAM
📺 Smart contract software is on the rise!
Rostyslav Bortman explains the use cases for this software category
➡️ Watch the full episode here
#podcast #01
Rostyslav Bortman explains the use cases for this software category
➡️ Watch the full episode here
#podcast #01
👍3
HackenProof - Crypto Bug Bounty
📺 Smart contract software is on the rise! Rostyslav Bortman explains the use cases for this software category ➡️ Watch the full episode here #podcast #01
Media is too big
VIEW IN TELEGRAM
📺 Hacken Extractor alerts you when your smart contract is getting tempered with!
➡️ Sign up for early access to test our software
#beta
➡️ Sign up for early access to test our software
#beta
👍4
Media is too big
VIEW IN TELEGRAM
📺 Diving in on the controversial crypto mixers!
Rostyslav Bortman argues that:
- they can be used for money laundering but they are necessary for legal private transactions
- cash transactions are just as private
➡️ Watch the full episode here
#podcast #01
Rostyslav Bortman argues that:
- they can be used for money laundering but they are necessary for legal private transactions
- cash transactions are just as private
➡️ Watch the full episode here
#podcast #01
👍2
Media is too big
VIEW IN TELEGRAM
📺 Money laundering and wash trading bump up NFT prices!
Rostyslav Bortman believes it’s already hard to objectively value NFTs, let alone deal with trade manipulations.
Thanks to projects like Beyond Rarity, NFTs can be valued according to market terms.
➡️ Watch the full episode here
#podcast #01
Rostyslav Bortman believes it’s already hard to objectively value NFTs, let alone deal with trade manipulations.
Thanks to projects like Beyond Rarity, NFTs can be valued according to market terms.
➡️ Watch the full episode here
#podcast #01
👍5
This media is not supported in your browser
VIEW IN TELEGRAM
✅ Coin98 has been listed on HackenProof:
The project rewards up to $10,000 per critical bug.
ℹ️ About Coin98 :
Coin98 Labs is an Open Infrastructure Financial Services builder focusing on creating and developing an ecosystem of DeFi protocols, applications, NFTs on multiple blockchains.
💸 Coin98 bug bounty rewards hackers according to these tiers:
- Critical:$5,000 - $10,000
- High:$1,000 - $5,000
- Medium:$500 - $1,000
- Low:$0 - $500
Once you’re ready, click here to join the bounty hunt!
#new_bounty
The project rewards up to $10,000 per critical bug.
ℹ️ About Coin98 :
Coin98 Labs is an Open Infrastructure Financial Services builder focusing on creating and developing an ecosystem of DeFi protocols, applications, NFTs on multiple blockchains.
💸 Coin98 bug bounty rewards hackers according to these tiers:
- Critical:$5,000 - $10,000
- High:$1,000 - $5,000
- Medium:$500 - $1,000
- Low:$0 - $500
Once you’re ready, click here to join the bounty hunt!
#new_bounty
🥰4❤2👍1
✅ Dexalot has been listed on HackenProof:
The project rewards up to $100,000 per critical bug.
ℹ️ About Dexalot :
Dexalot is a decentralized exchange that conducts order-book transactions on the Avalanche blockchain platform. The project achieves cost-effectiveness and on-chain transaction execution while balancing the convenience of use and functionality of centralized transactions.
💸 Dexalot bug bounty rewards hackers according to these tiers:
- Critical: $50,000 - $100,000
- High: $20,000 - $30,000
- Medium: $5,000 - $10,000
- Low: $1,000 - $1,000
Once you’re ready, click here to join the bounty hunt!
#new_bounty
The project rewards up to $100,000 per critical bug.
ℹ️ About Dexalot :
Dexalot is a decentralized exchange that conducts order-book transactions on the Avalanche blockchain platform. The project achieves cost-effectiveness and on-chain transaction execution while balancing the convenience of use and functionality of centralized transactions.
💸 Dexalot bug bounty rewards hackers according to these tiers:
- Critical: $50,000 - $100,000
- High: $20,000 - $30,000
- Medium: $5,000 - $10,000
- Low: $1,000 - $1,000
Once you’re ready, click here to join the bounty hunt!
#new_bounty
👍7🥰2