#hackertips search results
[HACKER TIP] Top Burp Suite Extensions: 1- Turbo Intruder 2- J2EEScan 3- Autorize 4- Active Scan++ 5- Collaborator Everywhere 6- Param Miner 7- JSON Beautifier 8- Upload Scanner 9- Freddy 10- Logger++ #bugbounty #hackertips #BurpSuite
[HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character. example: redirect_to=////evil%E3%80%82com #bugbounty #hackertips #openredirect
[HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing EXEC xp_cmdshell 'Command Option'; Thanks @H4MA_TN for the tip 🙏 #bugbounty #hackertips
#HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy
Silly #HackerTips - you know those spare SMD parts you pull off boards? Micro SD holders! You can see what's in there well enough for it to be a useful resource at times.
Hacker tip: the tiny soy sauce sushi plates are perfect for holding screws and small parts when doing a hardware hack or modification #HackerTips
#HackerTips - I suspected this would be awesome and not disappointed; $3 footswitch plus three croc clips (normally open/closed). SO HANDY for power cycling board, hitting reset, triggering scope, etc when hands full. Camera trigger & "paste txt to app" sound good too. Cheap!
[HACKER TIP] If you came across SSTI in a go application, it is worth trying the following payload {{define "T1"}}<script>alert(1)</script>{{end}} {{template "T1"}} to achieve XSS and bypass HTML sanitization. #bugbounty #hackertips #XSS
Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections. Exp: HEAD Request to /login username=foo&password=foo #bugbounty #hackertips
[HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML. #bugbounty #hackertips
Looking for IDOR but API return 403 forbidden, try to send wildcard as user id '{"id":"*"}' or use the ID in array '{"id":[123]}'. #bugbounty #hackertips @TnMch_
When compiling tools (like aircrack-ng), it's important to color coordinate with the game you're playing to pass the time. #HackerTips
There isn't just one way to authenticate with an API! Find old versions, and if there is /api/v3/ ,check if /api/v1/ also exists > It could be vulnerable. #bugbounty #hackertips @TnMch_
[HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions. @BelkahlaAhmed1 #bugbounty #hackertips
[HACKER TIP] If you find a blind error based XXE but out-of-band interactions are blocked you can use a system DTD and redefine an entity that is declared within that DTD. #bugbounty #hackertips
Bug bounty tips : user enumeration, internal IP disclosure, full path disclosure are not so dangerous by themselves but if you combine them with another issue > jackpot ! 🤑 #hackertips #incrowdwetrust #bugbounty
[HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities. #bugbounty #hackertips #XSS
[HACKER TIP] Don’t forget to test if “null” origin is reflected in Access-Control-Allow-Origin header since some developers always use it for local development and tests. You can obtain the null origin and exploit it using a sandboxed iframe. 🚀 #bugbounty #hackertips
When testing the password reset function, be sure to add your email with the victim's email, it can send you both the verification reset code which makes account takeover possible. exp : {"email":["[email protected]","[email protected]"]} #bugbounty #hackertips @TnMch_
🔍 It’s not just about finding vulnerabilities, it’s about reporting them right. Check out the 10 rules every hacker should follow to keep their reputation strong and boost valid find rates. 💥 Learn, apply, and climb the ranks. #BugBounty #HackerTips #CyScopeCommunity
14/ Follow me @Hoesenbug for tactical bug bounty breakdowns. More threads like this. Real hacks. Real lessons. #Hoesenbug #HackerTips #BugBounty
Want to learn hacking but ignoring networking? That’s like wanting to be a chef but hating fire.🔥 Start here: – TCP/IP – Ports – OSI Model – Wireshark Don’t skip this. #Networking #HackerTips #TryHackMe #CyberSecurity
🔓 7 unexpected ways hackers can access your account — and you might not even see them coming. Stay one step ahead! #CyberSecurity #OnlineSafety #HackerTips #ITSupportMelbourne #Cybersecurity #ITSupportforAustralianBusinesses #ITConsultation
Time to pivot our threat modeling and user education strategies 🔐 6/ Protect yourself: Don’t download "fixes" from unverified sources Check URLs closely Use sandboxing for suspicious links Educate non-tech users — they’re the prime targets #CyberAware #HackerTips
Don’t just scan with Nmap. Use flags! 𝚗𝚖𝚊𝚙 -𝙰 -𝚃𝟺 𝚝𝚊𝚛𝚐𝚎𝚝.𝚌𝚘𝚖 gives OS, services, and scripts. #KaliLinux #Nmap #HackerTips #kalilinuxin #bugbountytips
Elevate your security game! Combining a strong username & password with multi-factor authentication is your best defense against cyber threats. Stay one step ahead—secure access, guaranteed. 💻📱 #Cybersecurity #HackerTips #StaySecure"
9/11 For top cybersecurity tips and news on how to protect your digital space, follow @Eth1calHackrZ. Let’s stay ahead of the game and secure our future online! 🔒🌐 #CyberSecurity #DigitalProtection #HackerTips #StaySafeOnline
10. Join Travel Hacking Communities 🤝 - Learn from other travel hackers and stay updated on the latest deals and strategies. 📚💡 #TravelCommunity #HackerTips
Social engineering: the human element of hacking. Never underestimate its power. #HackerTips #CyberSecurity
[HACKER TIP] Top Burp Suite Extensions: 1- Turbo Intruder 2- J2EEScan 3- Autorize 4- Active Scan++ 5- Collaborator Everywhere 6- Param Miner 7- JSON Beautifier 8- Upload Scanner 9- Freddy 10- Logger++ #bugbounty #hackertips #BurpSuite
[HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character. example: redirect_to=////evil%E3%80%82com #bugbounty #hackertips #openredirect
[HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing EXEC xp_cmdshell 'Command Option'; Thanks @H4MA_TN for the tip 🙏 #bugbounty #hackertips
[HACKER TIP] If you came across SSTI in a go application, it is worth trying the following payload {{define "T1"}}<script>alert(1)</script>{{end}} {{template "T1"}} to achieve XSS and bypass HTML sanitization. #bugbounty #hackertips #XSS
Looking for IDOR but API return 403 forbidden, try to send wildcard as user id '{"id":"*"}' or use the ID in array '{"id":[123]}'. #bugbounty #hackertips @TnMch_
Hacker tip: the tiny soy sauce sushi plates are perfect for holding screws and small parts when doing a hardware hack or modification #HackerTips
[HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions. @BelkahlaAhmed1 #bugbounty #hackertips
[HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML. #bugbounty #hackertips
Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections. Exp: HEAD Request to /login username=foo&password=foo #bugbounty #hackertips
Have you every wondered which sections to put in your reports? Check out our best practice of the week by @gwendallecoguic 👇 #incrowdwetrust #bugbounty #hackertips
Silly #HackerTips - you know those spare SMD parts you pull off boards? Micro SD holders! You can see what's in there well enough for it to be a useful resource at times.
[HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities. #bugbounty #hackertips #XSS
if you find “403 Forbidden” while accessing a specific path, try using ";" which can lead to bypassing the restrictions. Exp : site.com/admin;/ #bugbounty #hackertips @TnMch_
Bug bounty tips : user enumeration, internal IP disclosure, full path disclosure are not so dangerous by themselves but if you combine them with another issue > jackpot ! 🤑 #hackertips #incrowdwetrust #bugbounty
There isn't just one way to authenticate with an API! Find old versions, and if there is /api/v3/ ,check if /api/v1/ also exists > It could be vulnerable. #bugbounty #hackertips @TnMch_
#HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy
[HACKER TIP] If you find a blind error based XXE but out-of-band interactions are blocked you can use a system DTD and redefine an entity that is declared within that DTD. #bugbounty #hackertips
Best practice of the week : remember that duplicates can be paid when you provide more details than the original report ! #hackertips #bugbounty #incrowdwetrust
When testing the password reset function, be sure to add your email with the victim's email, it can send you both the verification reset code which makes account takeover possible. exp : {"email":["[email protected]","[email protected]"]} #bugbounty #hackertips @TnMch_
#HackerTips - I suspected this would be awesome and not disappointed; $3 footswitch plus three croc clips (normally open/closed). SO HANDY for power cycling board, hitting reset, triggering scope, etc when hands full. Camera trigger & "paste txt to app" sound good too. Cheap!
Something went wrong.
Something went wrong.
United States Trends
- 1. Lakers 74.1K posts
- 2. #Talus_Labs N/A
- 3. Luka 67.9K posts
- 4. Wemby 26K posts
- 5. Marcus 31.5K posts
- 6. #LakeShow 5,591 posts
- 7. Blazers 8,395 posts
- 8. Russ 10.4K posts
- 9. Ayton 15.7K posts
- 10. Will Richard 6,388 posts
- 11. #AmphoreusStamp 6,469 posts
- 12. Horford 1,983 posts
- 13. #RipCity N/A
- 14. #dispatch 63.2K posts
- 15. Podz 2,398 posts
- 16. Thunder 36.7K posts
- 17. Godzilla 33.4K posts
- 18. Kuminga 3,341 posts
- 19. Nico Harrison 1,798 posts
- 20. Spencer Knight N/A