security
2024
⭐︎ Introduction to Practical Bug BountyAugust 31, 2024Threats and Countermeasures in AWS Environments from an Attacker’s PerspectiveAugust 25, 2024Summary of recommended learning content in Bug Bounty (YouTube)July 29, 2024Summary of Bug Bounty Village 2024July 23, 2024⭐︎ Introduction to Cloud Security - Threats and Countermeasures when Focusing on the AWS Environment from an Offensive PerspectiveJuly 10, 2024Interview Summary: Why I work on the Bug Bounty and what I really enjoy about it.July 3, 2024Overview of Nahamcon 2024May 26, 2024Intigriti Q1 2024 resultsMay 21, 2024Summary of CVE IDs obtained while a studentMay 20, 2024We have started a podcast Bug Bounty JP PodcastFebruary 26, 2024⭐︎ Introduction to Cloud Security from an Offensive Perspective (AWS Edition)January 22, 2024Summary of specific threat examples of XSS in Bug BountyJanuary 17, 2024Summary of CTF Cloud attack methods (2023 version)January 9, 20242023
Top 10 Most Vote Vulnerability Reports on Bug Bounty (2023 Edition)December 27, 2023Summary of Mobile App Vulnerability Reporting Cases in Bug BountyDecember 13, 2023Summary of Critical Vulnerability Reports on the Bug BountyDecember 12, 202310 recommended Browser Extensions for Bug BountyDecember 7, 2023⭐︎ Summary of Static and Dynamic Analysis of JavaScript in Bug BountyDecember 6, 202310 recommended tools for Bug BountyDecember 5, 202310 recommended Burp Extensions for use in Bug BountyDecember 4, 2023⭐︎ Introduction to Bug BountySeptember 25, 2023⭐︎ Introduction to Bug Hunting (OSS edition)September 19, 2023Avoiding MFA authentication for AWS login by phishing and case studiesSeptember 4, 2023Security-JAWS DAYS Participation Record & CTF Creator CommentaryAugust 31, 2023⭐︎ Security (vulnerability) cases in Amazon EC2August 31, 2023⭐︎ Summary of CTF Cloud attack methods (2022 version)May 22, 20232022
Summary of HTB Cloud attack methodsOctober 13, 2022⭐︎ Summary of CTF Cloud attack methods (2021 version)October 11, 2022Security risks of serverless environments in AWS servicesOctober 8, 2022⭐︎ Security risks and countermeasures due to vulnerable use of Amazon S3July 26, 2022⭐︎ Security risks and countermeasures in AWS LambdaMay 30, 2022⭐︎ Serverless Security Risks - Vulnerability Attacks and Countermeasures in AWS LambdaMarch 16, 2022AWS Lambda Pitfalls - Risks and Security Measures Due to Vulnerable LibrariesFebruary 24, 20222020
⭐︎ An Introduction to JWT from a Security PerspectiveDecember 10, 2020