Someone who is into the Offensive side of Security — Practicing [ Web application Pentesting, Bug bounty & Red teaming ]

Basically, we want to identify as many endpoints as possible, sort and filter them, scan them automatically and perform manual assessments where applicable

We need to identify assets which belong to the target company and are in-scope. The first thing is to identify domains and sub-domains belonging to the target.

Subdomain Enumeration

Subfinder
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. …

In this age of Internet almost everything is online and connected to internet and the topics of data safety and online security have never been as important as they are today. However, not a lot of people are aware of importance of online safety!

And in this era of internet…

How to become a bug hunter?

Photo by Markus Spiske on Unsplash

Before focusing on path first lets discuss what bug hunting is?

A bug bounty program allows hackers to receive compensation for reporting bugs, also known as vulnerabilities and possible exploits, in organizations’ hardware, firmware, and software

Who are Bug Hunter?

Bug bounty hunters are individuals who know the nuts and bolts of cybersecurity and are well versed in finding…

Photo by Sigmund on Unsplash

These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA triad. Together, these three principles form the cornerstone of any organization’s security infrastructure; in fact, they (should) function as goals and objectives for every security program.

Confidentiality

Confidentiality is concerned with preventing unauthorized access to sensitive information…

Scanning in Hacking

Scanning:- It involves taking the information discovered during reconnaissance and using it to examine the network. Tools that a hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners. …

Himansh17

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store