Letβs hack a Windows Web Application running IIS.
After a short scan, one small detail stood out.
Most people would scroll past it.
Checkout the IIS Filename Enum lab π
https://app.hackinghub.io/hubs/iis-filename-enum
@hackinghub.bsky.social
Educating the next generation of ethical hackers @ https://hackinghub.io
Letβs hack a Windows Web Application running IIS.
After a short scan, one small detail stood out.
Most people would scroll past it.
Checkout the IIS Filename Enum lab π
https://app.hackinghub.io/hubs/iis-filename-enum
Without naming the bug class, tell me 3 things about it that only a real hacker would recognize. πΆοΈ
Let's see whoβs actually been in the terminal. π
To everyone in the HackingHub community: we want your honest feedback. π«΅
Whatβs working? Whatβs not? What courses should exist?
Survey takes 2 min + raffle entry.
β
https://forms.gle/2KSMehv8XKHZPb4Z6
Stop asking for permission and start injecting your own headers with cURL.
Try it.π
$5K on the line. π°Β
3 minutes to find one bug.
Which vuln class are you betting on? π
Think you have the hacker mindset? Prove it.Β
New challenges are live.
Explore them here π
https://app.hackinghub.io/hubs?type=challenge
When a developer trusts the server-side without proper validation, they aren't just building an app, they're building a $10k payout for the first person who notices. π΅οΈββοΈ
13.02.2026 21:02 β π 0 π 0 π¬ 0 π 0Does this look safe to you?
If yes, then you are trusting the backend too much.π
Spot what goes wrong π
π¨LAST CALL: Tomorrow is the big day! Fetch the Flag 2026 with @snyksec and @NahamSec officially kicks off.
This is your final chance to sign up and test your skills against the best in the community.
Register now! π
https://snyk.io/es/events/ctf/?utm_campaign=evt__snyk-ftf26-nahamsec_gbl
What are the top skills for starting in Bug Bounty hunting? π―
@nahamsec shares his takeπ
Think a migration to Nginx fixed everything? Think again.
In this new lab, @nahamsec demonstrates how to exploit legacy filename enumeration to leak hidden files that "don't exist" on the front end.
Watch the video and launch the labπ
https://app.hackinghub.io/hubs/iis-filename-enum
Event details:
π
February 12-13
β° 12 PM ET start
Whether you're flying solo or bringing your crew (up to 5 teammates),
It's time to put your skills to the test.Β
π’Register today:
π©We'reΒ teaming up with @snyksec to bring you 24 hours of hands-on hacking challenges.Β
What's waiting for you:
π 15 challenges across web, binary, exploitation & more
π Compete against 1,000+ teams for prizes
β‘ Sharpen your skills in real-world scenarios
How do you turn a βmaybe bugβ into a real payout? π°
Most hunters stop when they see odd behavior.Β Β
Serious ones push until the impact is undeniable.
If your bug doesnβt survive step 5, was it ever real?
Bug Bounty Rule #1: Read the scope.
06.02.2026 21:02 β π 0 π 0 π¬ 0 π 0Sometimes Web Cache Deception isnβt about bypassing auth.
Itβs about how the cache sees the URL.
If /account is private, try:Β Β
β
/account.css
β
/account.jpgΒ Β
β
/account;test.css
If the cache thinks itβs static,Β Β
it might store authenticated content.
Worth testing
π© Fetch the Flag CTF is next week!
HackingHub and @NahamSec are teaming up with @snyksec to bring you 24 hours of hands-on hacking challenges.Β
Register todayπ https://snyk.co/ujxq4
Most Python devs scroll past this.
Should they? π
Want to find the bugs everyone else is missing? Go where they won't follow. π
Most hackers stick to the easy, public-facing apps. But the real "jackpots" are often hiding behind gated applications built for businesses, not just consumers.
(With @NahamSec)
Fetch the Flag 2026 with @snyksec and @NahamSec is here!
Sign up and test your skills against the best in the community.
Event Details:
π
February 12-13
β° 12 PM ET start
Ready to compete? Register todayπ https://snyk.co/ujxq4
Stop hoarding URLs. Start filtering.Β
Wayback isnβt noisy by default,Β your intent is.π
Check thisπ
Try it if you canπ
01.02.2026 01:02 β π 0 π 0 π¬ 0 π 0Only real hackers know the power of this.
28.01.2026 20:31 β π 0 π 0 π¬ 0 π 0How do you turn a "boring" observation into a $70,000 bounty? π°
Most hackers are looking for complex exploits, but this legend walked away with a massive payout just by paying attention.
Check out the full story in our latest Hub!π
β
https://app.hackinghub.io/hubs/2fa-madness
π€(@NahamSec)
Stop running manual recon. Start pipingπ οΈ
By chaining subfinder, dnsx, and httpx, you can move from a single domain to a live, probed asset list in seconds.π
Hackers after discovering @pdiscoveryio pipes and realizing they donβt have to click every link manually anymore.
23.01.2026 21:02 β π 0 π 0 π¬ 0 π 0Which 'lesser-known' tool in your arsenal gives you a competitive edge?
ππ€
Regex isnβt just for developers. Itβs a hackerβs precision tool for finding needles in haystacks, bypassing filters, and spotting vulnerabilities others miss.
β
Get started: https://app.hackinghub.io/course/regex-for-hackers/purchase
Many WAFs auto-block the default curl User-Agent.
Using the -A flag to spoof a real browser or mobile device is a simple way to bypass basic filters and uncover hidden, mobile-only endpoints.π