.

Sunday, 28 December 2014

Private Bug Bounty Programs 2015

Bug Bounty (wikipedia) A bug bounty program is a deal offered by many website and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities. Bug...
Read more ...

Friday, 26 December 2014

How to Hack WPA/WPA2 WIFI Passwords in 3 Steps [2014/2015 , pin ]

Reaver Hacking Wifi tutortial how to hack wifi wpa protected password 2014/2015 working new wps hacking hack wifi wpa2 password kali linux/backtrack5 and crack wifi.  How to Hack/Crack Wifi Password? One of the Useful method of Wifi Cracking/Hacking...
Read more ...

Sunday, 14 December 2014

Logout Cross site Request Forgery CSRF Vulnerability [worth bug 250$ ]

CSRF LOGOUT IMPACT : Logout should protect your logout mechanism against CSRF. At first it seems that all an attacker can do is logout the user, which would be annoying at worst. However, if you combine this with a phishing attack, the attacker may...
Read more ...

How to find Vulnerability in Website [2015,tools,top10 bugs]

How to Find Vulnerable Websites : Website security is a major problem today and should be a priority in any organization or a webmaster, Now a days Hackers are concentrating alot of their efforts to find holes in a web application, If you are a website...
Read more ...

Wednesday, 3 December 2014

Full path disclosure at ads.twitter.com [Vulnerability , Reward 140$]

Vulnerability found in ads.twitter.com Recently Independent Security Researcher Found a Vulnerability in Twitter .I was Really simple vulnerability but we can say its all about eagle eyes . Twitter Vulnerability Description:I noticed a small information...
Read more ...

Tuesday, 25 November 2014

Send friend request from their own accounts[Make a Friend Troll]

Introduction About this App I can say this is a Facebook Bug 2015 Because we are able to Send own Friend Request from your self and you can understand your reaction when you got a friend request from yourself through suggestion . How to Troll one of your...
Read more ...

Sunday, 23 November 2014

Break privacy on facebook | Three steps to break Facebook DP Privacy 2015

  How to Extract the Facebook DP ? Introduction OryxSolutions Software House develop a Useful app to access any person Facebook DP through Facebook DP Extractor, So anyone can see the Display Picture You just have to follow some easy...
Read more ...

Friday, 21 November 2014

How to Takover the Account by Simple Trick[Bug,csrf Protection]

Vulnerability type   InSecure Direct Object Reference How to Takeover the Account Via Simple Trick : Someone researcher found the account takeover vulnerability in Private website and so you can consider someone is me.so let me start how...
Read more ...

Wednesday, 19 November 2014

Sql Injection Vulnerability Found by Security Researcher in MyBB [tamperdata,test,examples]

  First of Fall what is sql injection ? SQL mixture is a kind of security try in which the attacker incorporates Structured Query Language (SQL) code to a Web structure information box to get access to resources or take off changes to data....
Read more ...

Monday, 10 November 2014

how to verify paypal without bank account 2015

Verify Paypal with bank account [in India]     Introduction: We all know that it's very hard to get credit card(in India) as it requires so many formalities so today we are going to see how to PayPal account by linking and confirming...
Read more ...

Wednesday, 29 October 2014

Open ssl security issue(vulnerabilities,ssl v 3 encryption,bug report) #3

  Poodle Bleed Vulnerability Found in Relateiq.com     Poodlebleed Issue POC Report : This vulnerability found by mtk . What is Poodle Bleed Vulnerability in website? Ans : A vulnerability in SSL 3.0/ssl v3/ssl v 3...
Read more ...

Wednesday, 15 October 2014

Bug bounty program websites List for ethical hackers

What is Bug Bounty Program for penetration Websites? Bug bounty program offered by many Famous and Private Static and Dynamic websites and software developers by which individuals can receive recognition programs and compensation for reporting bugs And...
Read more ...

About

Like Us