For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Exploiting weak configurations in Amazon Cognito (2021)
(
appsecco.com
)
2 points
by
mooreds
on March 14, 2022
|
past
Exploiting CSRF on JSON endpoints with Flash and redirects (2018)
(
appsecco.com
)
1 point
by
tosh
on Sept 13, 2020
|
past
AWS changed its PenTesting permission requirement
(
appsecco.com
)
2 points
by
diaanasxsw
on May 6, 2019
|
past
Open Source Intelligence Gathering 201 (Covering 12 additional techniques)
(
appsecco.com
)
1 point
by
ArtWomb
on Sept 8, 2018
|
past
Breaking Full Disk Encryption from a Memory Dump
(
appsecco.com
)
2 points
by
beefhash
on Aug 4, 2018
|
past
Breaking Full Disk Encryption from a Memory Dump
(
appsecco.com
)
2 points
by
ingve
on Aug 3, 2018
|
past
A penetration tester’s guide to sub-domain enumeration
(
appsecco.com
)
308 points
by
adamnemecek
on Nov 11, 2017
|
past
|
32 comments
Consider applying for YC's Summer 2026 batch! Applications are open till May 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.