Dangers of Using Self-Signed Certificates
SSL certificates are an integral part of today’s internet, allowing applications and services such as banking and other financial resources that require maximum security to be accessible from the comfort of one’s home.
theHarvester: a Classic Open Source Intelligence Tool
Have you ever wished you could retrieve data from multiple sources in a quick and easy manner as part of your reconnaissance of a threat?
How to Boost Your Bug Bounty Hunting with SQL Explorer
Despite a growing multiplicity of platforms, learning resources and community forums in recent times, the practice of bug bounty hunting remains a challenging undertaking for many.
Top 12 Bug Bounty Browser Extensions
Web browser extensions give additional functionality to normal browsers, running in the background and helping users increase the efficiency of their tasks. Even security professionals and bug bounty hunters, while boasting more advanced and technical tools in their toolstacks, aren’t skipping out on using browser extensions, plugins and add-ons for quick information gathering, OSINT collection, and aiding in executing different attacks. These methods reduce the need for more separate tools for other pen testing and bug hunting tasks.
The Most Misunderstood Element: Recon
Hey! I’m Michael, but more commonly known as “codingo”. By night, I’m at YouTube making content on bug bounties for fun, and by day I work as the Global Head of Security Operations and Researcher Enablement for Bugcrowd, the original and one of the largest bug bounty platforms.
The Power of Being a Misfit: Speaking with Fredrik Alexandersson STÖK
Have you ever noticed some of the most creative thinkers and individuals seem to be misfits? There is power in being a misfit — being different, thinking creatively and outside the box, and rejecting established norms. Misfits are also frequently part of the counterculture.
How to Query Massive Port Scan Data with the SecurityTrails API™
The most important part of both bug bounty hunting and security research is the ability to find vulnerabilities quickly, before an attacker can take advantage of them.
SecurityTrails Secures Funding from Prominent Security Tech Leaders
Today we’re sharing with you that we raised funding to accelerate growing SecurityTrails and building The Total Internet Inventory™ . We’ve assembled and are grateful for this awesome group of investors who are supporting our product-led strategy:
Mentoring the Upcoming Generation of Bug Bounty Hunters with Hakluke
We are in a time where global economies are screeching to a halt while cybercrime is not resting. With cybercrime predicted to inflict damages totaling $6 trillion in 2021, its rise has outraced traditional security teams and methodologies, making it harder to detect, mitigate, and resolve an escalating number of threats.
How to Find Associated Domains and IP Neighbors with the SecurityTrails API™
It has long been argued that a carefully-planned initial OSINT strategy favors the outcome of the remaining engagement.