π The Ultimate Reading List for Bug Bounty and Penetration Testing Enthusiasts - 2023
π https://hacklido.com/blog/247-the-ultimate-reading-list-for-bug-bounty-and-penetration-testing-enthusiasts-2023
π https://hacklido.com/blog/247-the-ultimate-reading-list-for-bug-bounty-and-penetration-testing-enthusiasts-2023
HACKLIDO
The Ultimate Reading List for Bug Bounty and Penetration Testing Enthusiasts - 2023
Are you tired of spending your days hunting for bugs in your own code? Are you ready to take your bug hunting skills to the next level and start making r...
π1
π Hunting For Sensitive Information Using GitHub
π https://hacklido.com/blog/249-hunting-for-sensitive-information-using-github
π https://hacklido.com/blog/249-hunting-for-sensitive-information-using-github
HACKLIDO
Hunting For Sensitive Information Using GitHub
Hi everyone π In this blog post, I will tell you how you can use github to search for sensitive information in repo or in whole organization. The trick is...
π All about: Open Redirects Attack
π https://hacklido.com/blog/250-all-about-open-redirects-attack
π https://hacklido.com/blog/250-all-about-open-redirects-attack
HACKLIDO
All about: Open Redirects Attack
Sites often use HTTP or URL parameters to redirect users to a specified URL without any user action. While this behavior can be useful, it can also cause o...
π₯1
π Securing Your Linux Server with Host-based Firewall Protection using Iptables
π https://hacklido.com/blog/251
π https://hacklido.com/blog/251
HACKLIDO
Securing Your Linux Server with Host-based Firewall Protection using Iptables
Introduction: In todayβs connected world, the need for robust security measures for servers and networks is more important than ever. One of the most eff...
π₯2π1
π Steps to Set Up a Firewall with UFW
π https://hacklido.com/blog/252-steps-to-set-up-a-firewall-with-ufw
π https://hacklido.com/blog/252-steps-to-set-up-a-firewall-with-ufw
HACKLIDO
Steps to Set Up a Firewall with UFW
Setting up a firewall on your Linux system is an important step in securing your network. One tool that you can use to accomplish this is Uncomplicated Fi...
π3β€1
π You Should Still Care About XXE In 2023! Here's an outline
π https://hacklido.com/blog/256-you-should-still-care-about-xxe-in-2023-heres-an-outline
π https://hacklido.com/blog/256-you-should-still-care-about-xxe-in-2023-heres-an-outline
HACKLIDO
You Should Still Care About XXE In 2023! Here's an outline:
What is it XXE = XML eXternal Entities XML presents a useful resource for sending data from service to service and for data processing internally but wi...
π2β€1
π¨ Job Alert
1 opening for IoT Pentester job
Interested people dm @IamAlch3mist
Full time
Location: Bangalore
Freshers can also apply
1 opening for IoT Pentester job
Interested people dm @IamAlch3mist
Full time
Location: Bangalore
Freshers can also apply
π2
π What To Do When You Find Open Port Without More Information
π https://hacklido.com/blog/257-what-to-do-when-you-find-open-port-without-more-information
π https://hacklido.com/blog/257-what-to-do-when-you-find-open-port-without-more-information
HACKLIDO
What To Do When You Find Open Port Without More Information
Hi everyone, in this article I will tell you a simple method for getting about an open port. So the method is really, simple: Visit https://www.speedgui...
β€1π1
π How I identified and reported vulnerabilities in Oracle and the rewards of responsible disclosure:From Backup Leak to Hall of Fame
π https://hacklido.com/blog/259
π https://hacklido.com/blog/259
HACKLIDO
How I identified and reported vulnerabilities in Oracle and the rewards of responsible disclosure:From Backup Leak to Hall of Fame
Hello folks I hope you are doing well. Iβm a Parag Bagul security Researcher and bug bounty hunter. This article is based on a 2022 finding in which I di...
π2β€1
π Detecting & Bypassing Defensive Measures (Canary Token)
π https://hacklido.com/blog/268-detecting-bypassing-defensive-measures-canary-token
π https://hacklido.com/blog/268-detecting-bypassing-defensive-measures-canary-token
HACKLIDO
Detecting & Bypassing Defensive Measures (Canary Token)
In the last part, we talk about how to track the hackerβs activities on our network using a canary token. If donβt know that part then check this LINK to fi...
π Cyber Security Round Up #4 - Jan 31st, 23
π https://hacklido.com/blog/269-cyber-security-round-up-4-jan-31st-23
π https://hacklido.com/blog/269-cyber-security-round-up-4-jan-31st-23
HACKLIDO
Cyber Security Round Up #4 - Jan 31st, 23
January 31st, 2023 π 150,00 EUR worth XSS, Binary Exploitation, Hacking ATMs, JavaScript Hacking, API Security, NoSQL, SSRF, IDORs & moreβ¦ We...