Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

Practical guide for hunters: how leaked webhooks are abused and how to defend them

published on 2025-09-17 12:35:22 UTC by /u/unknownhad
Content:

I wrote a hands on guide that shows how leaked webhooks surface as an attack vector; how to find them in the wild; how to craft safe non destructive PoCs; how to harden receivers. Includes curl examples for Slack and Discord; Node.js and Go HMAC verification samples; a disclosure template.

Why this matters

  • webhooks are often treated as bearer secrets; leaks are common
  • small mistakes in verification or ordering can become business logic bugs
  • many real world impacts are serviceable without flashy RCE

What you get in the post

  • threat model and scope guidance
  • detection rules and SIEM ideas

Read it here: https://blog.himanshuanand.com/posts/2025-09-17-how-to-hack-webhooks/
Notes: do not test endpoints you do not own. follow program scope and responsible disclosure rules.

Happy hunting

submitted by /u/unknownhad
[link] [comments]
Article: Practical guide for hunters: how leaked webhooks are abused and how to defend them - published 25 days ago.

https://www.reddit.com/r/netsec/comments/1njbx3q/practical_guide_for_hunters_how_leaked_webhooks/   
Published: 2025 09 17 12:35:22
Received: 2025 09 17 12:59:09
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Views: 10

Custom HTML Block

Click to Open Code Editor