unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Hunting down subdomain takeover vulnerabilities
子域名接管漏洞是由于公司未删除指向已停用第三方服务的DNS记录而产生的安全问题。攻击者可借此控制相关子域名并进行恶意活动。本文介绍了如何识别此类漏洞(包括区分非易受攻击的情况),并详细探讨了多种利用方法(如OAuth/SSO令牌泄露、Cookie窃取、CSRF和CORS攻击等),同时强调了自动化工具在检测中的重要性。...
2025-4-8 00:0:0 | 阅读: 9 |
收藏
|
Intigriti - www.intigriti.com
subdomain
takeovers
security
statuspage
Adoption of CVSS v4.0 vulnerability assessment calculator
CVSS 4.0 是由 FIRST 组织维护的通用漏洞评分系统最新版本,旨在通过新增补充指标组和移除范围概念等改进,提供更细致、精准的漏洞评估,并更好地反映现实风险。该版本引入了新的评估维度和方法,帮助组织更高效地优先处理漏洞并制定修复策略。...
2025-4-3 00:0:0 | 阅读: 17 |
收藏
|
Intigriti - www.intigriti.com
security
scoring
requirement
prioritize
Intigriti insights into latest beg bounty scam
恶意行为者伪装成白帽黑客,通过虚假报告漏洞或上传敏感数据索要赏金。这种“beg bounty”骗局利用企业对安全威胁的担忧,导致资源浪费和信任危机。企业需借助专业团队识别真实威胁,并建立漏洞赏金计划以防范此类诈骗。...
2025-3-25 00:0:0 | 阅读: 12 |
收藏
|
Intigriti - www.intigriti.com
security
spot
beg
intigriti
cloudpets
8 Tips for writing effective bug bounty reports
文章介绍了如何撰写有效的漏洞赏金报告,强调清晰的标题、详细的复现步骤、明确的影响描述以及良好的结构的重要性,并提供了实用建议以提高报告的接受率和影响力。...
2025-3-25 00:0:0 | 阅读: 17 |
收藏
|
Intigriti - www.intigriti.com
triager
submission
triage
intigriti
idor
Access control vulnerability in the retail industry. Cross-Site Scripting (XSS) use case
零售行业因大规模运营和广泛的攻击面易受网络犯罪影响。第三方供应链管理不善、假期促销活动及技术漏洞(如XSS)加剧风险。数据泄露频发,涉及客户信息及企业机密。建议加强安全培训、定期更新系统及启用多因素认证以降低风险。...
2025-3-13 00:0:0 | 阅读: 20 |
收藏
|
Intigriti - www.intigriti.com
security
malicious
unc5537
sell
retail
XXE: A complete guide to exploiting advanced XXE vulnerabilities
XML External Entity (XXE) vulnerabilities are one of the most overlooked yet impactful vulnerabiliti...
2025-3-11 00:0:0 | 阅读: 26 |
收藏
|
Intigriti - www.intigriti.com
aca
php
ad4
adw
Finance industry: Top vulnerabilities in 2024 and what to watch for in 2025
金融服务行业面临日益严峻的网络安全威胁,数据泄露成本上升至608万美元。信息泄露和注入漏洞频发,如LoanDepot数据泄露事件及移动应用安全缺陷。DORA法规增加了欧盟金融机构的合规压力。未来需警惕AI驱动攻击、身份盗窃及 ransomware 演化。加强API安全、输入验证及实时监控是关键防御措施。...
2025-2-27 00:0:0 | 阅读: 18 |
收藏
|
Intigriti - www.intigriti.com
injection
security
ransomware
notable
Software industry: Top vulnerabilities in 2024 and what to watch for in 2025
文章总结了2024年软件行业面临的主要安全威胁,包括API配置错误、访问控制漏洞和跨站脚本攻击(XSS),并强调了漏洞赏金计划在主动发现和修复安全问题中的重要性。文章还提供了针对这些威胁的行动建议,并展望了2025年软件公司应采取的预防措施,以应对日益复杂的网络安全挑战。...
2025-2-15 02:26:20 | 阅读: 24 |
收藏
|
Intigriti - www.intigriti.com
security
software
cloud
attackers
Intigriti Bug Bytes #221 - February 2025
这篇文章介绍了2月份的漏洞挖掘技巧、工具推荐、社区活动及竞赛信息。内容涵盖PDF生成器中的SSRF漏洞、隐藏参数检测工具DOM Invador、2FA漏洞绕过方法等,并预告了BSides Galway和Limburg等活动。此外,还邀请读者参与找错竞赛赢取奖品,并鼓励分享 newsletter 提供建议。...
2025-2-14 00:0:0 | 阅读: 25 |
收藏
|
Intigriti - www.intigriti.com
generators
kick
intigriti
invador
5 Ways to hack WordPress targets
这篇文章介绍了如何识别和利用WordPress网站中的常见安全漏洞。内容包括过时版本、暴露配置文件、错误的安全设置、弱密码以及易受攻击的插件和主题。通过工具如WPScan和Google dorking,可以快速发现并测试这些漏洞。文章还鼓励使用自动化工具进行大规模扫描,并建议参与漏洞赏金计划以实践技能。...
2025-2-13 00:0:0 | 阅读: 23 |
收藏
|
Intigriti - www.intigriti.com
wordpress
wp
security
php
Hybrid Pentesting: The Smart Approach to Securing your Assets
文章介绍了Intigriti的Hybrid Pentesting服务,结合传统渗透测试与漏洞赏金模式。该服务时间限制灵活、成本效益高,可快速设置并实时更新进展。通过独特的奖励机制和专家团队支持,帮助企业高效识别漏洞并满足合规需求。...
2025-2-5 00:0:0 | 阅读: 20 |
收藏
|
Intigriti - www.intigriti.com
bounties
security
pentests
intigriti
Creating custom wordlists for bug bounty targets: A complete guide
2025-1-31 00:0:0 | 阅读: 14 |
收藏
|
Intigriti - www.intigriti.com
Power of the collective: Investing in the security researcher community for shared success
Our researcher community is the beating heart of our bug bounty platform, identifying hard-to-find v...
2025-1-30 00:0:0 | 阅读: 18 |
收藏
|
Intigriti - www.intigriti.com
security
ethical
intigriti
invest
Exploiting PDF generators: A complete guide to finding SSRF vulnerabilities in PDF generators
PDF generators are commonly implemented in applications. Developers tend to use these components to...
2025-1-27 00:0:0 | 阅读: 16 |
收藏
|
Intigriti - www.intigriti.com
generators
injection
ssrf
Unwavering support: Your bug bounty journey, our priority
The foundation of a successful partnership is a shared commitment to mutual growth – this is somethi...
2025-1-22 00:0:0 | 阅读: 17 |
收藏
|
Intigriti - www.intigriti.com
security
intigriti
partnership
invest
goals
DORA is here - are you ready?
Today, January 17, 2025, marks a pivotal moment for the EU financial sector as the Digital Operation...
2025-1-17 00:0:0 | 阅读: 18 |
收藏
|
Intigriti - www.intigriti.com
dora
ict
resilience
operational
Open URL redirects: A complete guide to exploiting open URL redirect vulnerabilities
Open URL redirect vulnerabilities are easy to find as they are quite common in applications. This vu...
2025-1-16 00:0:0 | 阅读: 19 |
收藏
|
Intigriti - www.intigriti.com
attacker
bypass
php
security
Innovation in action: Investing in the future of bug bounty
In an industry where security needs evolve as rapidly as the threats themselves, standing still isn'...
2025-1-15 00:0:0 | 阅读: 16 |
收藏
|
Intigriti - www.intigriti.com
security
intigriti
development
innovation
investment
7 Overlooked recon techniques to find more vulnerabilities
Reconnaissance is an important phase in bug bounty and in pentesting in general. As every target is...
2025-1-13 00:0:0 | 阅读: 18 |
收藏
|
Intigriti - www.intigriti.com
proxy
routes
security
ffuf
Intigriti Bug Bytes #220 - January 2025
这篇文章介绍了2025年首个Bug Bytes的内容,包括Altera启动公开漏洞赏金计划、Intigriti CTF挑战赛及工具资源分享。文章还提供了漏洞测试技巧、工具推荐及平台动态更新,旨在帮助研究人员提升技能并发现更多漏洞。...
2025-1-10 00:0:0 | 阅读: 17 |
收藏
|
Intigriti - www.intigriti.com
hunters
intigriti
cheat
goals
Previous
5
6
7
8
9
10
11
12
Next