Posts
2024
⭐︎ P3NFEST 2024 Summer Hands-on Course Report (Introduction to Practical Bug Bounty)September 2, 2024⭐︎ Introduction to Practical Bug BountyAugust 31, 2024Threats and Countermeasures in AWS Environments from an Attacker’s PerspectiveAugust 25, 2024Summary of recommended learning content in Bug Bounty (YouTube)July 29, 2024Summary of Bug Bounty Village 2024July 23, 2024⭐︎ Introduction to Cloud Security - Threats and Countermeasures when Focusing on the AWS Environment from an Offensive PerspectiveJuly 10, 2024Interview Summary: Why I work on the Bug Bounty and what I really enjoy about it.July 3, 2024⭐︎ Why work on the Bug Bounty and What's really exciting about itJune 25, 2024Overview of Nahamcon 2024May 26, 2024Intigriti Q1 2024 resultsMay 21, 2024Summary of CVE IDs obtained while a studentMay 20, 2024Story about being selected as an AWS Community BuilderMarch 11, 2024Participation in JAWS DAYS 2024 (Student Speakers)March 4, 2024We have started a podcast Bug Bounty JP PodcastFebruary 26, 2024⭐︎ Introduction to Cloud Security from an Offensive Perspective (AWS Edition)January 22, 2024Summary of specific threat examples of XSS in Bug BountyJanuary 17, 2024Summary of CTF Cloud attack methods (2023 version)January 9, 2024⭐︎ Job hunting story by a new graduate student who wants to become a Security EngineerJanuary 6, 20242023
2023 RetrospectiveDecember 28, 2023Top 10 Most Vote Vulnerability Reports on Bug Bounty (2023 Edition)December 27, 2023Blogs I wrote while a student that got a good response (Top 5)December 19, 2023Summary of Mobile App Vulnerability Reporting Cases in Bug BountyDecember 13, 2023Summary of Critical Vulnerability Reports on the Bug BountyDecember 12, 202310 recommended Browser Extensions for Bug BountyDecember 7, 2023⭐︎ Summary of Static and Dynamic Analysis of JavaScript in Bug BountyDecember 6, 202310 recommended tools for Bug BountyDecember 5, 202310 recommended Burp Extensions for use in Bug BountyDecember 4, 2023Summary of the actual situation of Bug Bounty Hunter in Bug BountyOctober 25, 2023⭐︎ Introduction to Bug BountySeptember 25, 2023⭐︎ Introduction to Bug Hunting (OSS edition)September 19, 2023Avoiding MFA authentication for AWS login by phishing and case studiesSeptember 4, 2023Security-JAWS DAYS Participation Record & CTF Creator CommentaryAugust 31, 2023⭐︎ Security (vulnerability) cases in Amazon EC2August 31, 2023MBSD Cybersecurity Challenges 2022 InterviewJune 26, 2023⭐︎ Summary of CTF Cloud attack methods (2022 version)May 22, 20232022
2022 RetrospectiveDecember 28, 2022Summary of HTB Cloud attack methodsOctober 13, 2022⭐︎ Summary of CTF Cloud attack methods (2021 version)October 11, 2022Security risks of serverless environments in AWS servicesOctober 8, 2022Security Camp National Convention 2022 Tutor Participation Record (B Class)August 15, 2022⭐︎ Security risks and countermeasures due to vulnerable use of Amazon S3July 26, 2022⭐︎ Security risks and countermeasures in AWS LambdaMay 30, 2022Technical books recommended by IPFactory for first-year students (2022 edition)April 7, 2022⭐︎ Serverless Security Risks - Vulnerability Attacks and Countermeasures in AWS LambdaMarch 16, 2022AWS Lambda Pitfalls - Risks and Security Measures Due to Vulnerable LibrariesFebruary 24, 20222020
⭐︎ An Introduction to JWT from a Security PerspectiveDecember 10, 2020SecHack365 Alumni InterviewApril 1, 20202019
Review of SECCON 2019December 30, 2019Review of CODE BLUE 2019December 6, 2019Review of SecHack365 Returns (2019)October 12, 2019Review of SecHack365 (2018)April 2, 2019