Posted in Newsletter on December 31, 2019
The 5 Hacking NewsLetter 52
Posted in Newsletter on May 7, 2019
Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.
This issue covers the week from 26 of April to 03 of May.
Our favorite 5 hacking items
1. Video of the week
Any video by @stokfredrik & @jhaddix is a must watch! This one has 5 crucials things you want to do as a bug hunter:
- Don’t limit yourself to the external attack surface. Log in as different users & try to find where the sensitive functionality is => access controls bugs & IDOR
- Find out how the site references you as a user (& what you’re allowed to do) => IDOR, File upload, RCE
- Test all parameters => SSRF, LFI, RFI, Path traversal
- Content discovery => hidden paths, private data leakage => Authentication bypass, logic flaws
- Find out which business flaws the target cares about (other than technical bugs)
But this is not all. Watch the video. It’s short but full-packed with information!
2. Conference of the week
Nullcon Goa 2019, especially:
I really recommend watching the talk “How To Use Bug Bounty To Start A Career In Silicon Valley”. It has awesome advice on leveraging bug bounty hunting to build a solid resume and find a job in Silicon Valley (or anywhere else). This includes which bugs and programs to focus on, which pitfalls to avoid, etc.
“Best Of Google VRP 2018” is also a good resource for bug hunters who want to succeed with Google VRP. Some of the advice applies to other programs too (like specializing in a product/attack vector).
3. Article of the week
This is an excellent interview of @securinti. What I like about it most is that the interviewer, @_zulln, is also a hacker. So unlike most interviews of this sort, the questions and answers are very technical and mindblowing for anyone starting out as a bug hunter.
I highly recommend this read if you want to find out what sets apart successful bug hunters from beginners.
Here are some interesting excerpts:
Many hackers look for bugs, I look for attack scenarios and then for the bugs. And it works for me as I get fewer duplicates. The downside is that I spend time researching ideas that sometimes yield nothing.
Scanners do not detect logical bugs, because to detect them you need context, you need to understand the application and the business logic. While everyone is looking for XSS I am just reading the docs.
4. Resource of the week
If you’re interested in Android app hacking, checkout this workshop. It’s about reverse engineering Android apps and includes both theory and exercises. Just awesome!
5. Non technical item of the week
So many hackers suffer from at least of the mental struggles mentioned in this article: imposter syndrome, burnout, anxiety and depression.
I hear/read more and more testimonies on this especially on Twitter, and I have similar experience myself. Hacking involves so much learning/change/stress…
So it’s nice to know that I am/we are not alone in this. And it is helpful to read a fellow hacker’s perspective on these issues, and how he deals with them.
Other amazing things we stumbled upon this week
- Security Now 712: Credential Stuffing Attacks
- Darknet Diaries Ep 37: LVS
- Security In Five Episode 480 - Tools, Tips and Tricks - Spring Clean Your Windows by Taproot Security
- Secure Digital Life #108 - Spy Cameras
- Paul’s Security Weekly #601 - The Canary Tool, Thinkst
- Hack Naked News #216 - April 30, 2019
Webinars & Webcasts
- BHIS Webcast: Weaponizing Corporate Intel. This Time, It’s Personal! & Slides
- Webcast: Attack Tactics 5 – Zero to Hero Attack
- CSIAC Webinars - OWASP Amass: Discovering Your Exposure on the Internet
- Safe Harbor for Hackers & Slides
- Building a Small and Flexible Wireless Exfiltration Box with SDR & Demo: Wireless Exfil Box w/ SDR (Paul Clark)
- Injection attacks in apps with NoSQL Backends
- Github security bug bounty hunting
- Exploit development for penetration testers
Medium to advanced
- Fun with Burp Suite Session Handling, Extensions, and SQLMap
- AWS IAM Exploitation
- Unauthenticated Session Fixation Attacks
- Attacking RMI based JMX services
- Android Application Diffing: CVE-2019-10875 Inspection
- Frida Android libbinder
- Running Fuchsia on the Android Emulator
- Cronjob Backdoors
- Automating Red Team Homelabs: Part 2 – Build, Pentest, Destroy, and Repeat
- How to Weaponize the Yubikey
- Manually Enumerating Active Directory
- Exploiting Unconstrained Delegation
- Using Google groups for OSINT
- Google groups misconfiguration
- Burp Suite Tips – Volume 1 & Volume 2
- Apache Server-Status
- Crawl a web page, extract all domains and resolve them to IP addresses
- Swagger API
- Finding your WiFi password using netsh on Windows 10
- Windows Privilege Escalation using sudo su?
- Windows PrivEsc: Weak Service Permission
- USB Password Stealer Turorial
- Intigriti XSS challenge solutions
- BountyCon CTF 2019
- The Butcher challenge by @0xGiraffe
- Analysis-Report Chinese Police App “IJOP” 12.2018: Not exactly a pentest report, but interesting if you’re into mobile app security. Cure53 tested IJOP, an Android app used by Chinese law enforcement, to find out if it violates human rights
- Komodosec| Through the cloud — remote debugging to crack MQ
- Serverless Security & The Weakest Link (Avoiding App DoS)
Responsible disclosure writeups
- How I hacked 50+ Companies in 6 hrs
- Put.io API design issues - “I can haz your files”
- Story of a Hundred Vulnerable Jenkins Plugins
- Why you shouldn’t do client-sided checks only; unlimited data via EE gifting system
- Remote Code Execution (RCE) in CGI Servlet – Apache Tomcat on Windows – CVE-2019-0232
- WebLogic RCE (CVE-2019-2725) Debug Diary
- OEM Presentation Platform Vulnerabilities
- Remote Code Execution on most Dell computers & PoC
- Synacktiv advisories regarding a bunch of pre-authenticated issues in GLPI
Bug bounty writeups
- XSS & Cache poisoning on Twitter ($2,520)
- XSS on Twitter ($2,940)
- Local file theft/JS injection/open redirect on Twitter ($1,120)
- 2FA bypass on private program
- Cookie bombing on private program ($350)
- Account takeover due to password autofill on Linode & Reddit discussion
- Logic flaw on Google
- SSRF on private program
- Facebook IDOR bug in GraphQL (video)
See more writeups on The list of bug bounty writeups.
- Argument Injection Hammer & Introduction: Burp extension for detecting argument injection and manipulation vulnerabilities
- Docker_burp & Introduction: Burp as a Docker Container
- Dirmap & Introduction: “An advanced web directory scanning tool that will be more powerful than DirBuster, Dirsearch, cansina, and Yu Jian.”
- HostHunter: A recon tool for discovering hostnames using OSINT techniques
- DumpTheGit: Searches through public repositories to find sensitive information uploaded to the Github repositories
- pentest.sh: Installs pentesting tools, then symlinks them to be ran seamlessly
- WhatBreach: OSINT tool to find breached emails and databases
- PwnedOrNot: OSINT Tool to Find Passwords for Compromised Email Addresses
- Coerchck: PowerShell Script For Listing Local Admins
- EvilClippy: A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows
- SSL Kill Switch 2: Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps
Misc. pentest & bug bounty resources
- What_is_this_c2: For quick visual fingerprinting of login panels
- XSS Tricks
- Android Security Monthly Recap #4 | April 2019
- APIsecurity.io Issue 29: OAuth2 attacks, car GPS vulnerabilities, and honeypot stats
- Nginx Admin’s Handbook
- @nullenc0de’s password cracking dictionary
- Yes We Hack IRC chan
- PwnSec Discord server
- Google CTF 2019 is here: “Qualification round will take place online Sat/Sun June 22 and 23 2019”
- ESI Injection Part 2: Abusing specific implementations & Edge Side Includes abused to enable RCE
- My Recon Process — DNS Enumeration
- Bypassing SOP Using the Browser Cache
- The Difference Between URLs, URIs, and URNs (updated)
- How to do application security on a budget
- 59 Hosts to Glory — Passing the OSCP
- Port Scanning, Spoofing & Blacklists
- An inside look at how credential stuffing operations work
- How did I break a captcha with Puppeteer and Google Vision ?
- The inception bar: a new phishing method
Bug bounty / Pentest news
- Google Chrome’s XSS Auditor goes back to filter mode
- 2019 Buggy Award Winners
- Amazon S3 will no longer support path-style API requests starting September 30th, 2020: S3 will only accept paths in the form
- AWS changes its PenTesting permission requirement, Appsecco found out exactly what is allowed and what is not
- Remote root access on all Cisco Nexus 9000 Series devices due to a default SSH key pair: Accident or backdoor?
- Hundreds of Orpak gas station systems can be easily hacked thanks to hardcoded passwords
- Millions of consumer smart devices exposed by serious security flaw: A software feature called iLnkP2P, identified in at least two million devices made by several companies, is vulnerable to MiTM attacks.
- More than half of popular email clients are vulnerable to signature spoofing
Breaches & Attacks
- A hacker is wiping Git repositories and asking for a ransom: “all evidence suggests that the hacker has scanned the entire internet for Git config files, extracted credentials, and then used these logins to access and ransom accounts at Git hosting services”
- Report: Unknown Data Breach Exposes 80 Million US Households
- Microsoft Outlook Email Breach Targeted Cryptocurrency Users: “a hacker getting hold of a Microsoft customer support worker’s login credentials; from there, the hacker could dive into the content of any non-corporate Outlook, Hotmail, or MSN account”
- Latest WebLogic vulnerability exploited for Cryptomining and DDoS Attacks & Ransomware
- Hackers Steal and Ransom Financial Data Related to Some of the World’s Largest Companies: A hacker blackmailed and leaked financial data stolen from Citycomp. It’s an internet infrastructure firm that provides services to many large companies like Oracle, Volkswagen & Airbus
- Recent Confluence vulnerability exploited in the wild by AESDDoS, a botnet that performs RCE, DDoS & Cryptocurrency mining
- Hacker takes over 29 IoT botnets: “Hacker “Subby” brute-forces the backends of 29 IoT botnets that were using weak or default credentials.”
- Security experts weigh in on EU biometrics database plan
- Firefox Addons Being Disabled Due to an Expired Certificate: All Firefox addons disabled because of an expired intermediary certificate used to sign Mozilla addons.
- Is a sticky label the answer to the IoT’s security problems?
- What I Learned After a Year as a Cybersecurity Mentor
- Learn to code in less than a week
- OSINT Recon Great? - Unique Usernames Are Better Than Unique Passwords
Tweeted this week
We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 04/26/2019 to 05/03/2019
Have a nice week folks!
If you enjoyed reading this, please consider sharing it, leaving a comment, suggestions, questions…