.

Sunday, 28 December 2014

Private Bug Bounty Programs 2015

Bug Bounty (wikipedia) A bug bounty program is a deal offered by many website and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities. Bug...
Read more ...

Friday, 26 December 2014

How to Hack WPA/WPA2 WIFI Passwords in 3 Steps [2014/2015 , pin ]

Reaver Hacking Wifi tutortial how to hack wifi wpa protected password 2014/2015 working new wps hacking hack wifi wpa2 password kali linux/backtrack5 and crack wifi.  How to Hack/Crack Wifi Password? One of the Useful method of Wifi Cracking/Hacking...
Read more ...

Sunday, 14 December 2014

Logout Cross site Request Forgery CSRF Vulnerability [worth bug 250$ ]

CSRF LOGOUT IMPACT : Logout should protect your logout mechanism against CSRF. At first it seems that all an attacker can do is logout the user, which would be annoying at worst. However, if you combine this with a phishing attack, the attacker may...
Read more ...

How to find Vulnerability in Website [2015,tools,top10 bugs]

How to Find Vulnerable Websites : Website security is a major problem today and should be a priority in any organization or a webmaster, Now a days Hackers are concentrating alot of their efforts to find holes in a web application, If you are a website...
Read more ...

Wednesday, 3 December 2014

Full path disclosure at ads.twitter.com [Vulnerability , Reward 140$]

Vulnerability found in ads.twitter.com Recently Independent Security Researcher Found a Vulnerability in Twitter .I was Really simple vulnerability but we can say its all about eagle eyes . Twitter Vulnerability Description:I noticed a small information...
Read more ...

About

Like Us