cookie

نحن نستخدم ملفات تعريف الارتباط لتحسين تجربة التصفح الخاصة بك. بالنقر على "قبول الكل"، أنت توافق على استخدام ملفات تعريف الارتباط.

avatar

BUG BOUNTY TOOLS & Courses

إظهار المزيد
لم يتم تحديد البلدالإنكليزية113 066التكنولوجيات والتطبيقات19 443
مشاركات الإعلانات
883
المشتركون
لا توجد بيانات24 ساعات
لا توجد بيانات7 أيام
+930 أيام

جاري تحميل البيانات...

معدل نمو المشترك

جاري تحميل البيانات...

إظهار الكل...
How to start Bug Bounty Hunting in 2023?

As we all know Learning bug bounty hunting is a great idea for anyone looking to break into the cyber security field. It can provide you with valuable ex...

JWT Authentication Bypass via Algorithm Confusion with No Exposed Key https://www.youtube.com/watch?v=4roTwhGSWZY
إظهار الكل...
JWT Authentication Bypass via Algorithm Confusion with No Exposed Key

👩‍🎓👨‍🎓 Learn about JSON Web Token (JWT) vulnerabilities. This lab uses a JWT-based mechanism for handling sessions. It uses a robust RSA key pair to sign and verify tokens. However, due to implementation flaws, this mechanism is vulnerable to algorithm confusion attacks. To solve the lab, we'll first obtain the server's public key. This is exposed via a standard endpoint. Next, we'll use this key to sign a modified session token that grants access to the admin panel at /admin, then delete the user carlos. Overview: 0:00 Intro 0:12 Recap 1:18 Deriving public keys from existing tokens 2:29 Lab: JWT authentication bypass via algorithm confusion with no exposed key 3:15 Solution: jwt_forgery.py (rsa_sign2n) 6:56 Conclusion If you're struggling with the concepts covered in this lab, please review the Introduction to JWT Attacks video first:

https://youtu.be/GIq3naOLrTg

🧠 For more information, check out

https://portswigger.net/web-security/jwt

🔗 Portswigger challenge:

https://portswigger.net/web-security/jwt/algorithm-confusion/lab-jwt-authentication-bypass-via-algorithm-confusion-with-no-exposed-key

🧑💻 Sign up and start hacking right now -

https://go.intigriti.com/register

👾 Join our Discord -

https://go.intigriti.com/discord

🎙️ This show is hosted by

https://twitter.com/_CryptoCat

( @_CryptoCat ) &

https://twitter.com/intigriti

👕 Do you want some Intigriti Swag? Check out

https://swag.intigriti.com

إظهار الكل...
JWT attacks

go to attacks, Skip Introduction

VULNERABLE Kernel Drivers for Security Research https://www.youtube.com/watch?v=3kQXu6TVXWw
إظهار الكل...
VULNERABLE Kernel Drivers for Security Research

LOLDrivers:

https://loldrivers.io/

Mike Haag:

https://twitter.com/M_haggis

The HTA Generator will be released and in a public Github repository this Friday, September 29! :) Free Cybersecurity Education and Ethical Hacking 🔥YOUTUBE ALGORITHM ➡ Like, Comment, & Subscribe! 🙏SUPPORT THE CHANNEL ➡

https://jh.live/patreon

🤝 SPONSOR THE CHANNEL ➡

https://jh.live/sponsor

🌎FOLLOW ME EVERYWHERE ➡

https://jh.live/discord

https://jh.live/twitter

https://jh.live/linkedin

https://jh.live/instagram

https://jh.live/tiktok

💥 SEND ME MALWARE ➡

https://jh.live/malware

YesWeHack Hunter Interviews – #6 RL: “Documentation is a goldmine of information” https://www.youtube.com/watch?v=wKeL_PFwYq4
إظهار الكل...
YesWeHack Hunter Interviews – #6 RL: “Documentation is a goldmine of information”

“Documentation is highly underrated” when it comes to understanding productive avenues for finding security flaws, according to the sixth interviewee in our series of hunter videos. Harel – hacking nickname ‘RL’ – also reflects on the virtue of patience when probing targets for vulnerabilities. Other topics covered in this interview include how RL’s interest in hacking was sparked during the pandemic and why a cache poisoning vulnerability is his favourite bug so far. Founded in 2015, YesWeHack is a global Bug Bounty & Vulnerability Disclosure Program (VDP) platform that leverages the skills of thousands of ethical hackers across 170 countries. The company helps organisations cost-effectively uncover and secure vulnerabilities in their websites, mobile apps, infrastructure and connected devices. Join us on www.yeswehack.com 00:16 How did you get started with Bug Bounty? 00:50 How do you prioritise your targets when starting a new Bug Bounty program? 01:20 What are your favourite hunting tools? 02:03 What is the most critical bug you have found so far? 02:40 What three words best describe you as a hacker? 03:02 What do you think is the most common mistake made by new researchers? 03:45 Any advice for a newbie Bug Bounty hunter? #bugbounty #bugbountytips #bugbountyhunter #YesWeRHackers

Working solution on how to inject system CA certificates in Android 14 https://httptoolkit.com/blog/android-14-install-system-ca-certificate/
إظهار الكل...
New ways to inject system CA certificates in Android 14

A couple of weeks ago I published a post about changes in Android 14 that fundamentally break existing approaches to installing system-level…

Automating Reconnaissance with Sling Shot R3con — powered by project Discovery tools https://medium.com/@enessyibrahim/automating-reconnaissance-with-sling-shot-r3con-powered-by-project-discovery-tools-2d6b870641da
إظهار الكل...
Automating Reconnaissance with Sling Shot R3con — powered by project Discovery

As developers and security enthusiasts, we often find ourselves automating repetitive tasks to save time and increase efficiency. In the…

إظهار الكل...
Tricky 2FA Bypass Leads to 4 digit Bounty $$$$

Hii Everyone i am Rohan Gupta part time bug hunter and Full time as a Jr. Security analyst.

GitHub - pwnwriter/haylxon: ⚡ Blazing-fast tool to grab screenshots of your domain list right from terminal. https://github.com/pwnwriter/haylxon
إظهار الكل...
GitHub - pwnwriter/haylxon: ⚡ Blazing-fast tool to grab screenshots of your domain list right from terminal.

⚡ Blazing-fast tool to grab screenshots of your domain list right from terminal. - GitHub - pwnwriter/haylxon: ⚡ Blazing-fast tool to grab screenshots of your domain list right from terminal.

اختر خطة مختلفة

تسمح خطتك الحالية بتحليلات لما لا يزيد عن 5 قنوات. للحصول على المزيد، يُرجى اختيار خطة مختلفة.