The 5 Hacking NewsLetter 33
Posted in Newsletter on December 25, 2018
Posted in Newsletter on August 19, 2018
Hey hackers! These are our favorite resources shared last week by hackers, pentesters, bug hunters and red teamers.
This issue covers the week from 10 to 17 of August.
Burp Hacks for Bounty Hunters by James Kettle (@albinowax)
These are advanced Burp hacks by James Kettle of PortSwigger Web Security. His day job is to design vulnerability detection techniques for Burp Suite, so when he shares tips on how to maximize your Burp ROI, he knows his stuff!
The talk is addressed to bug hunters, but the tips also apply to pentesters. I’ve been using Burp pro for years and wasn’t aware of many of these hacks.
@EdOverflow’s Guide To Subdomain Takeovers by EdOverflow
This is a great introduction to subdomain takeovers for bug hunters: what they are, the difference with second-order subdomain takeovers, the methodology and tools to detect them, multiple exploitation scenarios, etc.
How I Chained 4 Bugs(Features?) into RCE on Amazon Collaboration System
This is a writeup of a bug found on Amazon. It is a real life example of the vulnerability presented at Black Hat USA 2018: Breaking Parser Logic! Take Your Path Normalization Off and Pop 0days Out.
Here are my main takeways:
user.usernameis the Expression Language (EL) you wan to execute)
BSides Manchester 2018, especially:
- Practical Web Cache Poisoning: Redefining ‘Unexploitable’ by James Kettle (BSidesMCR 2018)
- It’s A PHP Unserialization Vulnerability Jim, But Not As We Know It by Sam Thomas & Slides
- How CTF Mindset Will Hurt You As A Penetration Tester by Idan Ron
- Cracking The Perimeter: How Red Teams Penetrate by Dominic Chell
- Diversity In InfoSec (Not That Sort!) by Victoria Walberg
- Adventures In WAF by Michael Thompson
- Hospitals And Infosec: The Consequences of Bad Security in Health Care: by Jelena Milosevic
- Social Engineering Tales Of Pirate Queen: by Sharka
It’s been a while since conference videos pertaining to pentest/bug bounty/red team were released. So it was refreshing to watch some of these talks (instead of just reading slides). Some are very technical and advanced, and others are not technical but are still informative. So there should something for everyone here.
This is not the kind of music I usually listen to. For hacking/work, I listen exclusively to electro music like Kygo, Avicii or the underrated Vexento.
But I always enjoy discovering new tracks through Defcon music albums. I thing they’re great if you’re looking for “hacker music” that is not too hardcore.
* To find slides for other talks, just search for
site:https://i.blackhat.com/us-18 in Google
We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 08/10/2018 to 08/17/2018
Have a nice weekend folks!
If you enjoyed reading this, please consider sharing it, leaving a comment, suggestions, questions…