Talk and help about bugbounty
Possible way to bypass ip
Cloud glow
And extract the real IP of the site
Knowing that I tried several methods and did not work
Hi, I found an ssti vulnerability on a large website and they have a bug bounty program with exceptionally high compensation (a limit of $500k+ for company/individual for reports submitted within 12 months). I didn't read the complete policy and just ran some tests on a "out of scope" asset before realizing I could perform an rce on a "in scope" asset from there and I probably also gain an rce on the out-of-scope asset (payload reflection on 2 endpoint ). Is it worthwhile to report the vulnerability, or will I suffer repercussions for testing on out-of-scope assets?
Читать полностью…Hi guys, does who known where can i find files from rapid7 sonar fdns? May be some torrents or something else.
Читать полностью…Hello I have Q , if I found bug in code should I exploite it so I can documented it , or the document with a good explanation is enough ?
Читать полностью…Try this here you can find 1500+ public bugbounty programs https://defensiveinet.com/bug-bounty-programs-list/
Читать полностью…📚 Free Course for OSCP Enthusiasts and Network Penetration Testers 🎯
I have been creating a free course in video and text formats for OSCP enthusiasts and network penetration testers. The course covers topics from Nmap to Active Directory exploitation, focusing on various red team tasks.
With over 5 years of experience and holding certifications like OSEP, OSWE, and OSCP, I have designed this course.
Feel free to connect for queries and improvements.
📖 Course Progress:
Module 1 - Network Enumeration:
1️⃣ Nmap:
- Practical demonstration of Nmap scanning and identifying open ports and services, including Wireshark usage.
- Access the chapter playlist: Nmap Playlist
- Read the GitBook: Nmap GitBook
2️⃣ Enumeration All The Things:
- Covering post-scanning enumeration techniques for network services and ports, explaining over 20 different tools and their use cases.
- Access the chapter playlist: Enumeration Playlist
- Read the GitBook: Enumeration GitBook
3️⃣ Metasploit All The Things:
- Deep dive into Metasploit, exploring its internal structure and various features.
- Perfect for those who want to utilize Metasploit to its full potential.
- Access the chapter playlist: Metasploit Playlist
- Read the GitBook: Metasploit GitBook
4️⃣ Web4Shell:
- Ongoing module showcasing web vulnerabilities that can be exploited for initial access (RCE).
- Covers topics like SQL injection to RCE, LFI to RCE, and more.
- Access the chapter playlist: Web4Shell Playlist
- Read the GitBook: Web4Shell GitBook
Feel free to dive into the course materials and enhance your knowledge in penetration testing! 🚀
Thank you, guys, for the overwhelming response. Whoever sends a resume, I will review it and get back to you. I have received a lot of resumes, so it will take a while.
Читать полностью…🤔Did you know❓
combining SQL Injection with LFI can lead to Remote Command Execution ☠️❓
⬇️Here's how..
SQL database (Mysql) can write file through into outfile and into dumpfile which can be used to write a small file in a temp directory. The written file may contain command to execute which will be evaluated by LFI and results RCE.
🙂You can watch todays live for a visual understanding against the same at 10PM IST.
https://youtu.be/OnxUnZv4v1s
Does any bro has the OSWP course material with no water mark. Mank thanks~
Читать полностью…Who knows how to perform a dirsearch if the main page redirects to another page?
Читать полностью…Great opportunity to grow your skills in AI, help in solving global issues and win the $$$ prizes at the same time !
Читать полностью…Hi guys, I need some urgent help, The android application detects the usb debugging enabled by using appsealing so is there any way to bypass it?
Читать полностью…if anyone want CEH, ccse , csa , comptia a+, security+,pentest+ linux+ , ejpt , itprotv , and any other related course than dm me
Читать полностью…in documentation include the exploit so they can see the impact that is called proof of concept
Читать полностью…Can anyone plz provide aditya shende bug bounty course
Читать полностью…a property is interpreted as a string and returned to you
Читать полностью…can i ask is these vuln to sspp? serverside prototype pollution?
Читать полностью…Stop Selling Courses Here!
I'll kick you out of the group without warning.
🔒🚨 Breaking News! Something Sinister Lurks in the Shadows 🚨🔒
😱 Unveiling the Dark Web's Darkest Secret... 100K+ ChatGPT Accounts Compromised! 😱
Are your private conversations at risk?
⚠️ Don't wait! Take a peek behind the veil of darkness and learn how cybercriminals are preying on unsuspecting ChatGPT users. Your online safety is at stake!
link : https://lnkd.in/dKYtkC3j