unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Part-2️♂️Bug Bounty Secrets They Don’t Tell You: Tricks From 100+ Reported Bugs
文章强调提问的重要性,并指出在达到一定水平后,速度、方法和高效recon是关键。...
2025-5-16 05:5:52 | 阅读: 5 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
shifts
unspoken
geminiwe
heard
figured
Part-2️♂️Bug Bounty Secrets They Don’t Tell You: Tricks From 100+ Reported Bugs
2025-5-16 05:5:52 | 阅读: 2 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
$500 Bounty: Race Condition in Hacker101 CTF Group Join
用户发现Hacker101邀请系统中的竞态条件漏洞,允许同一邀请链接多次加入同一团队。该漏洞通过并行HTTP请求滥用时间差触发。负责任披露后获得500美元奖励,展示了竞态条件对系统可靠性的影响。...
2025-5-16 05:2:36 | 阅读: 5 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
hacker101
invitation
timing
leaders
slight
$500 Bounty: Race Condition in Hacker101 CTF Group Join
2025-5-16 05:2:36 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Secret to find bugs in five minutes. Juicy reality.
文章指出,许多声称在五分钟内发现严重漏洞的文章夸大了表面成果,忽视了背后的长期努力和挣扎。真正的成功源于多年的积累和持续的学习,并非一蹴而就。提醒读者不要被表面故事迷惑,认识到核心努力的重要性。...
2025-5-16 05:2:2 | 阅读: 3 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
struggle
hair
titles
pluck
growth
Secret to find bugs in five minutes. Juicy reality.
2025-5-16 05:2:2 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Securing MCP Servers: Key Lessons from a Vulnerable Project
2025-5-16 05:1:16 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Microsoft Goes Passwordless: What You Need to Know
2025-5-16 05:1:4 | 阅读: 5 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
NoSQL Injection Detection — A hands-on Exploitation Walkthrough
文章描述了一个NoSQL注入检测实验的步骤:通过修改URL参数尝试单引号、加号和布尔条件等payload,观察结果以确认是否存在注入漏洞。...
2025-5-16 05:0:16 | 阅读: 3 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
accessories
nosql
confirms
injection
payload
NoSQL Injection Detection — A hands-on Exploitation Walkthrough
2025-5-16 05:0:16 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
How hackers chat securely on the darkweb
2025-5-16 05:0:1 | 阅读: 4 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
How a Simple Logic Flaw Led to a $3,250 Bounty
安全研究员Ashoka_Rao发现Zomato存在一漏洞:攻击者可篡改OTP流程非法声称未被认领的非配送餐厅为己有。该漏洞允许攻击者在未经授权的情况下绑定任何未被认领的餐厅至其账户。Zomato已处理此报告并奖励3250美元。...
2025-5-16 04:59:5 | 阅读: 3 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
unclaimed
zomato
otp
restaurant
restaurants
How a Simple Logic Flaw Led to a $3,250 Bounty
2025-5-16 04:59:5 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
From 0 to $$$: Finding Rate Limit Bypasses Like a Pro
文章介绍了一种寻找速率限制漏洞的方法,包括伪造IP地址、使用代理、旋转用户代理等技术,并提供了测试步骤和实际影响的例子。...
2025-5-16 04:58:5 | 阅读: 3 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
otp
bypass
rotate
unlimited
limiting
Top Tools That Helped Me Earn $500 in 30 Days
文章介绍了一位漏洞赏金猎人利用工具和技术快速发现漏洞的方法,包括通过修改请求参数测试IDOR漏洞和使用Turbo Intruder进行自动化参数测试。...
2025-5-16 04:57:24 | 阅读: 4 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
turbo
12345
intruder
idor
Blog Title: Not Your File: How Misconfigured MIME Types Let Me Upload Evil Scripts
文章描述了一个通过文件上传接口绕过安全验证的案例,展示了未正确验证MIME类型和文件内容可能导致远程代码执行(RCE)的风险,强调了在安全开发中严格验证文件类型的重要性。...
2025-5-15 05:1:29 | 阅读: 11 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
blah
scrolling
kicker
sipping
enjoy
Blog Title: Not Your File: How Misconfigured MIME Types Let Me Upload Evil Scripts
文章通过实例说明了文件上传漏洞的危害,强调了验证MIME类型的重要性,并展示了如何利用漏洞上传恶意文件。...
2025-5-15 05:1:29 | 阅读: 7 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
blah
peep
ended
kicker
☕Best Tool for Analyzing Java Files (90% of Hackers Don’t Know This)
Java文件可能隐藏内部逻辑、隐藏端点、未验证输入处理器和硬编码密钥等重要信息。忽视它们可能导致安全漏洞被遗漏。曾有研究者通过分析Java文件发现内部管理端点并实现账户接管,从而获得赏金。...
2025-5-15 05:0:35 | 阅读: 9 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
security
unvalidated
ignoring
leaving
gold
☕Best Tool for Analyzing Java Files (90% of Hackers Don’t Know This)
文章指出Java文件隐藏重要信息如内部逻辑、端点和秘密,并举例说明分析这些文件能发现高价值漏洞。...
2025-5-15 05:0:35 | 阅读: 10 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
dramatic
unvalidated
hardcoded
forgotten
hunters
Application Security Checklist: From Idea to Production
文章探讨了网络安全的重要性,强调独立开发者和初创企业在快速开发中常忽视安全问题。建议采取环境变量管理敏感数据、使用现成身份验证服务、避免硬编码敏感信息等措施。同时提醒定期更新依赖包、加密数据传输和存储,并通过HTTP头加强防护。作者指出安全应贯穿开发始终,而非事后补救。...
2025-5-15 04:58:2 | 阅读: 7 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
security
malicious
developers
Previous
1
2
3
4
5
6
7
8
Next