Open in app

Sign In

Write

Sign In

Mastodon
Craig Hays
Craig Hays

1.2K Followers

Home

Lists

About

Jun 4

Admin of One — A Powerful Way to Highly Limit Blast Radius

One of the most important principles of cyber security is Admin of One. By reducing the number of devices a password can manage to a single device, the impact of a single admin password being compromised in a cyber attack such as ransomware can be drastically reduced. How Ransomware Happens When ransomware gangs…

Cybersecurity

4 min read

Admin of One — A Powerful Way to Highly Limit Blast Radius
Admin of One — A Powerful Way to Highly Limit Blast Radius
Cybersecurity

4 min read


Published in

InfoSec Write-ups

·Sep 10, 2021

How Hackers Use Open-Source Intelligence to Ransomware Companies

Demonstrating with a real company how a hacker can compromise an organisation in under 2 hours using OSINT and social engineering. Video Transcript Today I’ll be demonstrating how cybercriminals use open-source intelligence to create targeted and highly effective phishing emails that can establish a foothold for company-wide ransomware attacks. …

Osint

8 min read

How Hackers Use Open-Source Intelligence to Ransomware Companies
How Hackers Use Open-Source Intelligence to Ransomware Companies
Osint

8 min read


Published in

InfoSec Write-ups

·Aug 11, 2021

How I Bought a £240.00 Annual Subscription for Bargain £0.01

I found a way to alter a premium subscription service price and bought it for a penny. This is how I did it. Whenever I’m bug hunting on a target that takes payments, I always try to buy something using a test credit card number as described in my write-up…

Cybersecurity

4 min read

How I Bought a £240.00 Annual Subscription for Bargain £0.01
How I Bought a £240.00 Annual Subscription for Bargain £0.01
Cybersecurity

4 min read


Published in

InfoSec Write-ups

·Jul 22, 2021

Pre-Account Takeover by Reversing a Weak Email Verification Token Algorithm

I spoofed access to other people’s email in order to pre-steal user accounts before they are first registered. Here’s how I did it. One thing I always test while hacking on bug bounty programs is how applications generate tokens. …

Cybersecurity

7 min read

Pre-Account Takeover by Reversing a Weak Email Verification Token Algorithm
Pre-Account Takeover by Reversing a Weak Email Verification Token Algorithm
Cybersecurity

7 min read


Published in

InfoSec Write-ups

·Jun 22, 2021

Cracking Encrypted Credit Card Numbers Exposed By API

I found an API that exposed encrypted credit card numbers. Here’s how I cracked them to reveal the full card details. While hacking on a private bug bounty program, I found a graphql endpoint that exposed way more information about logged in users than it should have done. By playing…

Cybersecurity

6 min read

Cracking Encrypted Credit Card Numbers Exposed By API
Cracking Encrypted Credit Card Numbers Exposed By API
Cybersecurity

6 min read


Published in

InfoSec Write-ups

·Jun 18, 2021

One Time Code Bypass With An Inverted Brute-Force Attack

“We’ve sent a six-digit code to your email address. Enter it below to login.” We see them all the time while testing web applications. In order to verify your identity, the application sends a 6 digit numerical code to your registered email address or phone number. The purpose is to…

Bug Bounty

4 min read

One Time Code Bypass With An Inverted Brute-Force Attack
One Time Code Bypass With An Inverted Brute-Force Attack
Bug Bounty

4 min read


Published in

Digital Diplomacy

·Nov 6, 2020

Why You Should Never Trust a Free Proxy Server

Free and open proxy servers promise anonymous internet access, but at what cost? In a world of ever-decreasing online privacy, it’s easy to get sucked into the ‘use an anonymous proxy to stay safe’ narrative. …

Cybersecurity

6 min read

Why You Should Never Trust a Free Proxy Server
Why You Should Never Trust a Free Proxy Server
Cybersecurity

6 min read


Published in

The Startup

·Oct 30, 2020

How Phishing Websites Use Captcha to Fool Browsers and People

Evading detection and building trust with Captcha challenges and Smishing attacks. This week I received another SMS Phishing attack which was almost identical to the previous Smishing attack I covered. There were two things that struck me as particularly interesting this time: The attack used the s.id …

Cybersecurity

5 min read

How Phishing Websites Use Captcha to Fool Browsers and People
How Phishing Websites Use Captcha to Fool Browsers and People
Cybersecurity

5 min read


Published in

The Startup

·Oct 25, 2020

Phishing Email to Company Devastating Ransomware in 5 Hours

How hackers manually escalated from a malicious email to a devastating, company-wide ransomware takeover in under 5 hours. (This article aims to contextualize an excellent incident report by Thedfirreport.com. I’ve used my own experience to fill in the gaps to demonstrate how these attacks affect real people in real companies.) The Attack Started Like Many Others …

Cybersecurity

7 min read

Phishing Email to Company Devastating Ransomware in 5 Hours
Phishing Email to Company Devastating Ransomware in 5 Hours
Cybersecurity

7 min read


Published in

osint

·Oct 2, 2020

How An Investigator Can Find Your Location From One Photograph

Every image you post online leaks information about you. This is how anyone can find your location using Open Source Intelligence (OSINT). Open Source Intelligence In Action — Geolocating a Photograph Open Source Intelligence (OSINT) is the practice of using public or ‘open source’ information available on the internet to gather intelligence and gain insights on given targets. …

Osint

7 min read

How An Investigator Can Find Your Location From One Photograph
How An Investigator Can Find Your Location From One Photograph
Osint

7 min read

Craig Hays

Craig Hays

1.2K Followers

FinTech startup to £105 million acquisition. Now I make stuff and help people with cyber security. https://craighays.com

Following
  • Tim Denning

    Tim Denning

  • David O.

    David O.

  • Lucky225

    Lucky225

  • Dave Schools

    Dave Schools

  • Luke Stephens (@hakluke)

    Luke Stephens (@hakluke)

See all (94)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams