Saajan BhujelforInfos3c Blogsinfos3c.hashnode.net·Oct 25, 2022How I Got $10,000 From GitHub For Bypassing Filtration oF HTML tagsHey everyone👋 I hope you're having an A+ week!🚀 In today's blog, I am going to tell you that, “How I Got $10,000 From GitHub For Bypassing A Filtration oF HTML tags” A few months back, One day I was just scrolling the Twitter feed. And, Suddenly a...Discuss·12 likes·296 readsGitHub
MD Tajdar Alam AnsariforInfos3c Blogsinfos3c.hashnode.net·Dec 3, 2022DNS Security: How The Phone Book Of The Internet Stays SafeIntroduction Greetings earthlings! In this article, I will be discussing about DNS security (Domain Name System). We will see What is DNS? What are the different DNS vulnerabilities and attack vectors? How do we secure DNS? How DNS can be a secur...Discuss·12 likes·91 readsdns
Hossam mesbahforInfos3c Blogsinfos3c.hashnode.net·Dec 2, 2022Broken Access Control + Misconfiguration = Beautiful Privilege EscalationHello everyone, This story will be about the Privilege escalation vulnerability I found lately. There are 2 roles on this site creator/account owner Account owner user is the management and is able to access the full account users and other function...Discuss·11 likes·128 readsbugcrowd
AGNIHACKERSforInfos3c Blogsinfos3c.hashnode.net·Dec 11, 2022OTP Bypass Through Response ManipulationHello everyone, This is my first report. I am sure everyone will be aware of the first P1 vulnerability which is the most invisible of all(the strike of duplicates and not applicable). This Report is all about a beginner who gets a lot of Duplicates,...Discuss·9 likes·238 readsbugbounty
Un1tyforInfos3c Blogsinfos3c.hashnode.net·Dec 6, 2022Awkward: Hack The Box [HTB] WriteupIntroduction: Hi all! In this article I’m going to be tackling Awkward, a medium difficulty Linux machine on hackthebox.com. Happy hacking! Information Gathering: Let’s get started with an nmap scan. You know the drill: We can see in the scan output...Discuss·7 likes·178 readsCTF
MD Tajdar Alam AnsariforInfos3c Blogsinfos3c.hashnode.net·Dec 3, 2022DNS Security: How The Phone Book Of The Internet Stays SafeIntroduction Greetings earthlings! In this article, I will be discussing about DNS security (Domain Name System). We will see What is DNS? What are the different DNS vulnerabilities and attack vectors? How do we secure DNS? How DNS can be a secur...Discuss·12 likes·91 readsdns
StackzeroforInfos3c Blogsinfos3c.hashnode.net·Dec 3, 2022How You Can Create a GUI Password Generator in PythonHi readers! Here is another simple tutorial that will teach you how to create another real-life use script! In this tutorial, we’ll be building a password generator with GUI using python and Tkinter. This is a great project for beginners because it’s...Discuss·8 likes·107 readsPython
Un1tyforInfos3c Blogsinfos3c.hashnode.net·Dec 2, 2022Hack The Box [HTB] Writeup: PreciousHack the Box released a new machine this weekend called Precious and I was excited to get my hands on it. Precious is an easy-rated Linux machine. I found it pretty straightforward and would say that it's a good beginner-friendly machine. Happy hacki...Discuss·8 likes·25.3K readshtb
Hossam mesbahforInfos3c Blogsinfos3c.hashnode.net·Dec 2, 2022Broken Access Control + Misconfiguration = Beautiful Privilege EscalationHello everyone, This story will be about the Privilege escalation vulnerability I found lately. There are 2 roles on this site creator/account owner Account owner user is the management and is able to access the full account users and other function...Discuss·11 likes·128 readsbugcrowd
StackzeroforInfos3c Blogsinfos3c.hashnode.net·Dec 2, 2022Hackers, Who Are They? The Exciting Struggle Between Good And Evil.A brief description of what is a hacker and how they are classified in the cybersecurity world. Hi, I’m StackZero, the author of the namesake blog stackzero.net, in this article I would like to clarify what is meant by “hacker”. Hacker definition Hac...Discuss·8 likes·67 readsinfos3c
Antonio CheongforInfos3c Blogsinfos3c.hashnode.net·Nov 30, 2022How I Earned $47000 USD As A High School StudentIgnore my butchered English. It’s not my first language. Boring background (My life story) Chūnibyō: A colloquial Japanese term for early teens who have delusions of grandeur. Also a great anime. I was one of them, holding delusions of becoming a ‘ha...Discuss·7 likes·104 readsbugbounty
Veshraj GhimireforInfos3c Blogsinfos3c.hashnode.net·Nov 23, 2022Interesting Stored XSS via meta dataBack in February of this year, Bibek Neupane and I had hacked on a private bug bounty program on Hackerone, we had chosen one of the social platform as our target. This post will detail how we discovered Stored Cross-Site Scripting via meta data on o...Discuss·5 likes·335 readsXSS
Saajan BhujelforInfos3c Blogsinfos3c.hashnode.net·Oct 19, 2022Submission Guidelines — InfoSec BlogsWe're always looking to help people in the InfoSec community share and discuss new ideas and methodologies and learn from each other to improve their skills. What It Means to be Published with Infos3c Blogs The story will still appear on your profil...Discuss·300 readsinfos3c