all InfoSec news
Efficient methodology to get P2 level - subdomain takeover vulnerability
Dec. 27, 2022, 8:44 a.m. | Suprit Pandurangi
InfoSec Write-ups - Medium infosecwriteups.com
Hello Guys, I’m Suprit a cybersecurity enthusiast and researcher. This is mine first blog and I’m going to explain how I was able to hack a subdomain of an organization with mine easy and efficient methodology.
Hello F.R.I.E.N.D !!
I was hunting and keep switching from programs to programs from past few months. In my beginning phase of my journey I got more than 20 duplicated bugs and was tired and demotivated & there were lot of burnouts. Even …
bug bounty hacking infosec subdomain subdomain takeover takeover vulnerability
More from infosecwriteups.com / InfoSec Write-ups - Medium
Honeypots 101: A Beginner’s Guide to Honeypots
1 week, 1 day ago |
infosecwriteups.com
Devvortex Hackthebox Walkthrough
1 week, 2 days ago |
infosecwriteups.com
Port Scanning for Bug Bounties
1 week, 2 days ago |
infosecwriteups.com
Jobs in InfoSec / Cybersecurity
Enterprise Threat Intel Analyst
@ Resource Management Concepts, Inc. | Quantico, Virginia, United States
IT Security Engineer III
@ Mitsubishi Heavy Industries | Houston, TX, US, 77046
Cyber Intelligence Vice President, Threat Intelligence
@ JPMorgan Chase & Co. | Singapore, Singapore
Assistant Manager, Digital Forensics
@ Interpath Advisory | Manchester, England, United Kingdom
Tier 3 - Forensic Analyst, SME
@ Resource Management Concepts, Inc. | Quantico, Virginia, United States
Incident Response, SME
@ Resource Management Concepts, Inc. | Quantico, Virginia, United States