The 5 Hacking NewsLetter 33
Posted in Newsletter on December 25, 2018
Posted in Newsletter on September 17, 2018
Hey hackers! These are our latest favorite resources related to pentest & bug bounty.
This issue exceptionally covers two weeks, from 31 of August to 14 of September.
A practical guide to testing the security of Amazon Web Services (Part 1: AWS S3)
There is so much to learn to become a successful pentester/bug hunter. I can’t remember which famous bug hunter once said that it used to take him 9 month to learn about a new vulnerability!
That’s why I love this kind of comprehensive guides. It goes from the basics as if you’ve never heard of AWS S3 to advanced concepts on their security and how to test them for misconfigurations.
Script for gathering domains/subdomains with IPRanges of organization
I am currently trying to improve my recon process, mainly to find new targets (domains & subdomains) as quickly as they become available. So this script comes very handy and complements other more known tools.
It resolves each IP in a given IP range by checking if port 443 is open, retrieves the SSL certificate from port 443 and scrapes it for domains & subdomains.
I stumbled upon this article right after discovering a .git folder exposed on a bug bounty target. I was amazed at how easy it was to retrieve parts of the company’s source code and was wondering about the extent of this vulnerability.
This research answers the question and gives a great example of how to scale your hunt for such simple bugs.
Host headers attacks are usually associated with reset password pages or cache poisoning. From what I understood, this is a new way to exploit host headers attacks: it targets the OAuth implementation used to log into Periscope via Twitter.
Here is how I understand the attack:
Bounty Hunters by J Wolfgang Goerlich (GrrCon 2018)
I started this blog as a penetration tester, but I confess that I have been obsessed with bug hunting for months.
This is a nice talk about some bugs found by bug hunters on big companies and how to protect against them. The way the stories are narrated made me feel like I was sitting around a campfire with other bug hunters, hearing about their stories…
You can find the latest bug bounty writeups in our dedicated page: [List of bug bounty writeups]({{ site.url }}{{ site.baseurl }}/list-of-bug-bounty-writeups.html).
Only writeups that did not make it to this selection are listed below. This does not mean that they aren’t worth reading, just that they are not BUG BOUNTY writeups. We will soon post more details about how our curation process.
We created two collections of our favorite pentest & bug bounty related tweets shared these last two weeks. You’re welcome to read them directly on Twitter:
Have a nice week folks!
If you enjoyed reading this, please consider sharing it, leaving a comment, suggestions, questions…