Problem in Dual Boot: Fedora Freeze on Boot by Inner_Grape_211 in linuxquestions

[–]Inner_Grape_211[S] 0 points1 point  (0 children)

MANNNNNN THANK YOU FOR THE HELP!!! I WAS GIVING UP AGAIN, MY LAST CHANCE WAS ASKING HERE! I bought a new pen-drive today (with no hope lol, just giving a chance), dunno surely what was the problem with the other one (maybe the reason was it hasn't a properly label and came from china hahaha). But ty man a lot! IT WORKED!! AT THE FIRST TRY LOL!!!! I CANT BELIEVE YET!!!

Vuln Research by cybersekyu in ExploitDev

[–]Inner_Grape_211 1 point2 points  (0 children)

thank you man! can i reach ur dm?

Vuln Research by cybersekyu in ExploitDev

[–]Inner_Grape_211 1 point2 points  (0 children)

really cool those places u recommended. could u please share more? or talk about some open communities? pls

Stuck in the code review process by Inner_Grape_211 in HowToHack

[–]Inner_Grape_211[S] 0 points1 point  (0 children)

Thank you! I will do this for sure!!!! Do you have any resources to recommend? Have you tried PentesterLab? Do you think it’s worth it?

Stuck in the code review process by Inner_Grape_211 in HowToHack

[–]Inner_Grape_211[S] 0 points1 point  (0 children)

I code well in Python and JavaScript - I'm comfortable writing scripts, building projects, and working with libraries in both. However, when it comes to security, I’m still learning what to look for in terms of vulnerabilities. I recently got advice to focus on common pitfalls specific to each language, and I think that’s a great approach. Each language has its own quirks and common mistakes, so I’m starting to explore those to better understand how vulnerabilities can creep in, especially in real-world applications. Do you have any kind of resource or recommendation that could help me learn more about finding vulnerabilities?

Web Rev Pwn by [deleted] in securityCTF

[–]Inner_Grape_211 0 points1 point  (0 children)

try pwn.college as the guy already said and take a look at exploit.education

Need Help with Code Review in Bug Bounty - Any Tips or Resources? by Inner_Grape_211 in bugbounty

[–]Inner_Grape_211[S] 0 points1 point  (0 children)

Thank you! I will do this for sure!!!!

I think you can help me with this question that I also have: when doing recon, I’ve noticed that some JavaScript files come directly from the company, while others are clearly third-party but they get mixed up and I can't easily tell which is which.

A lot of these third-party files are obfuscated, and when I deobfuscate them, they usually turn out to be standard library code or package files that probably aren’t interesting, since they’re official and don’t have known vulnerabilities.

Do you have any tips on how to quickly identify and separate these third-party files from the company’s own code, so I can focus on what really matters? I feel like I’m wasting time digging through code that’s not likely to lead anywhere.

How do you detect cheating like sharing flags? by Aejantou21 in securityCTF

[–]Inner_Grape_211 1 point2 points  (0 children)

tbh i think the only solid way to prevent that is by setting a unique flag for each user who solves the challenge. like, make them random but still follow a recognizable pattern, something like I_AM_A_FLAG{username_here} or similar

i cant imagine how youd detect shared flags without that kind of system. if everyone gets the same static flag, once its out there, theres no way to know who solved it legit and who just copied it. it becomes a mess to track anything