HackingHub's Avatar

HackingHub

@hackinghub.bsky.social

Educating the next generation of ethical hackers @ https://hackinghub.io

33 Followers  |  1 Following  |  177 Posts  |  Joined: 18.11.2024  |  1.2676

Latest posts by hackinghub.bsky.social on Bluesky


Video thumbnail

Let’s hack a Windows Web Application running IIS.

After a short scan, one small detail stood out.

Most people would scroll past it.

Checkout the IIS Filename Enum lab πŸ‘‡
https://app.hackinghub.io/hubs/iis-filename-enum

18.02.2026 18:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Without naming the bug class, tell me 3 things about it that only a real hacker would recognize. πŸ•ΆοΈ

Let's see who’s actually been in the terminal. πŸ‘‡

17.02.2026 23:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

To everyone in the HackingHub community: we want your honest feedback. 🫡

What’s working? What’s not? What courses should exist?

Survey takes 2 min + raffle entry.

βœ… https://forms.gle/2KSMehv8XKHZPb4Z6

17.02.2026 16:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Stop asking for permission and start injecting your own headers with cURL.

Try it.πŸ‘‡

16.02.2026 19:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

$5K on the line. πŸ’°Β 

3 minutes to find one bug.

Which vuln class are you betting on? πŸ‘‡

15.02.2026 21:01 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Think you have the hacker mindset? Prove it.Β 

New challenges are live.

Explore them here πŸ‘‡
https://app.hackinghub.io/hubs?type=challenge

14.02.2026 18:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

When a developer trusts the server-side without proper validation, they aren't just building an app, they're building a $10k payout for the first person who notices. πŸ•΅οΈβ€β™‚οΈ

13.02.2026 21:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Does this look safe to you?

If yes, then you are trusting the backend too much.πŸ‘€

Spot what goes wrong πŸ‘‡

12.02.2026 13:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

🚨LAST CALL: Tomorrow is the big day! Fetch the Flag 2026 with @snyksec and @NahamSec officially kicks off.

This is your final chance to sign up and test your skills against the best in the community.

Register now! πŸ‘‡
https://snyk.io/es/events/ctf/?utm_campaign=evt__snyk-ftf26-nahamsec_gbl

11.02.2026 15:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
HackingHub HackingHub offers training and challenges for ethical web application hacking.

βœ…Blind XSS Masterclass:

10.02.2026 13:32 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

What are the top skills for starting in Bug Bounty hunting? 🎯

@nahamsec shares his takeπŸ‘‡

10.02.2026 13:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Video thumbnail

Think a migration to Nginx fixed everything? Think again.

In this new lab, @nahamsec demonstrates how to exploit legacy filename enumeration to leak hidden files that "don't exist" on the front end.

Watch the video and launch the labπŸ‘‡
https://app.hackinghub.io/hubs/iis-filename-enum

09.02.2026 17:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Fetch the Flag 2026 hosted by Snyk & NahamSec - Capture the Flag (CTF) Security Competition | Snyk Fetch the Flag 2026 with Snyk and NahamSec features 15 hands-on Capture the Flag security challenges and a chance to win one epic prize.

Event details:

πŸ“… February 12-13
⏰ 12 PM ET start

Whether you're flying solo or bringing your crew (up to 5 teammates),

It's time to put your skills to the test.Β 

🟒Register today:

09.02.2026 15:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

🚩We're teaming up with @snyksec to bring you 24 hours of hands-on hacking challenges. 

What's waiting for you:

πŸ”’ 15 challenges across web, binary, exploitation & more
πŸ† Compete against 1,000+ teams for prizes
⚑ Sharpen your skills in real-world scenarios

09.02.2026 15:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

How do you turn a β€œmaybe bug” into a real payout? πŸ’°

Most hunters stop when they see odd behavior.Β Β 
Serious ones push until the impact is undeniable.

If your bug doesn’t survive step 5, was it ever real?

07.02.2026 21:02 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Bug Bounty Rule #1: Read the scope.

06.02.2026 21:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Sometimes Web Cache Deception isn’t about bypassing auth.

It’s about how the cache sees the URL.

If /account is private, try:Β Β 

βœ… /account.css
βœ… /account.jpgΒ Β 
βœ… /account;test.css

If the cache thinks it’s static,Β Β 
it might store authenticated content.

Worth testing

05.02.2026 20:01 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

🚩 Fetch the Flag CTF is next week!

HackingHub and @NahamSec are teaming up with @snyksec to bring you 24 hours of hands-on hacking challenges.Β 

Register todayπŸ‘‰ https://snyk.co/ujxq4

04.02.2026 23:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Most Python devs scroll past this.

Should they? πŸ‘‡

04.02.2026 18:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Want to find the bugs everyone else is missing? Go where they won't follow. πŸ‘€

Most hackers stick to the easy, public-facing apps. But the real "jackpots" are often hiding behind gated applications built for businesses, not just consumers.

(With @NahamSec)

03.02.2026 21:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Fetch the Flag 2026 with @snyksec and @NahamSec is here!

Sign up and test your skills against the best in the community.

Event Details:
πŸ“… February 12-13
⏰ 12 PM ET start

Ready to compete? Register todayπŸ‘‰ https://snyk.co/ujxq4

03.02.2026 00:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Stop hoarding URLs. Start filtering.Β 

Wayback isn’t noisy by default,Β your intent is.πŸ‘€

Check thisπŸ‘‡

02.02.2026 16:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Try it if you canπŸ‘‡

01.02.2026 01:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Only real hackers know the power of this.

28.01.2026 20:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

How do you turn a "boring" observation into a $70,000 bounty? πŸ’°

Most hackers are looking for complex exploits, but this legend walked away with a massive payout just by paying attention.

Check out the full story in our latest Hub!πŸ‘‡

βœ…https://app.hackinghub.io/hubs/2fa-madness

πŸ‘€(@NahamSec)

27.01.2026 21:32 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Stop running manual recon. Start pipingπŸ› οΈ

By chaining subfinder, dnsx, and httpx, you can move from a single domain to a live, probed asset list in seconds.πŸ‘‡

27.01.2026 00:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Hackers after discovering @pdiscoveryio pipes and realizing they don’t have to click every link manually anymore.

23.01.2026 21:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Which 'lesser-known' tool in your arsenal gives you a competitive edge?

πŸ‘‡πŸ€–

23.01.2026 00:01 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Regex isn’t just for developers. It’s a hacker’s precision tool for finding needles in haystacks, bypassing filters, and spotting vulnerabilities others miss.

βœ…Get started: https://app.hackinghub.io/course/regex-for-hackers/purchase

21.01.2026 19:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Many WAFs auto-block the default curl User-Agent.

Using the -A flag to spoof a real browser or mobile device is a simple way to bypass basic filters and uncover hidden, mobile-only endpoints.πŸ‘‡

20.01.2026 15:30 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@hackinghub is following 1 prominent accounts