The 5 Hacking NewsLetter 33
Posted in Newsletter on December 25, 2018
Posted in Newsletter on December 10, 2018
Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.
This issue covers the week from 30 of November to 07 of December.
BSides Lisbon 2018, especially:
If you’re a professional pentester or looking for a pentesting job, then you should really watch the talk “How To Build Your Own Infosec Company”. It tackles a lot of topics: the advantages of small vs big pentesting companies, how to grow your own name and find your first client, how to organize your work and emails, plus many other tips.
This is a great writeup to learn about server-side template injection in HubL.
It’s written like a tutorial, with details on how to go from detection (entering {{7*7}} and getting ‘49’ displayed back) to information gathering and full remote code execution.
Hackerone challenges on HackEDU
Hackerone and HackEDU teamed up to offer the community 5 hacking challenges (“hackboxes”). These are great because they mirror real bugs found by Hackerone bug hunters and disclosed on Hacktivity, and they’re free.
The bugs and reports are listed on this blog post: Test your hacking skills on real-world simulated bugs.
The Paradox of Choice: Learning new skills in InfoSec without getting overwhelmed
As pentesters / bug hunters, we’ve all asked ourselves at some point: Where do I start? How do I become good at this? Or… How do I master it?
These are questions that Azeria already tried to answer in a previous talk and is now digging deeper in this new mini-series.
I strongly recommend reading both no matter where you are on the pentest / bug hunting mastery spectrum. Trying the strategy presented might help you deal better with the information overload that we all face in this field.
This is a good resource for digging deeper into Blind XSS vulnerabilities. It doesn’t explain the basics, but includes a polyglot, a list of payloads and links about AngularJS Blind XSS in particular.
This is specific enough to maybe help you (and me) find less trivial XSS bugs.
See more writeups on The list of bug bounty writeups.
Beginning today all Bugcrowd VDP or Bug Bounty programs will include Disclose.io messaging as the default policies within the program briefs
A low-privileged user account on most Linux operating systems with UID value anything greater than 2147483647 can execute any systemctl command unauthorizedly
The personal information of 500 million guests stolen What makes this breach stand apart … is the data that was taken. Hotels collect more PII data than most enterprise organizations (birthdays, passport numbers, email and mailing addresses, and phone numbers)
We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 11/30/2018 to 12/07/2018
Have a nice week folks!
And if you enjoyed reading this, please consider sharing it, leaving a comment, suggestions, questions…