Sponsored by

The 5 Hacking NewsLetter 56

Posted in Newsletter on June 4, 2019

The 5 Hacking NewsLetter 56

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 24 to 31 of May.

Our favorite 5 hacking items

1. Tool of the week


Keye is a really useful recon tool. It’s the first one I’ve come across that allows hackers to easily monitor changes in URLs.

It’s written in Python with SQLite3 integrated. You give it a list of urls, and run it periodically (using Cron for example). It then requests the urls and detects changes based on the responses’ Content-Length. You can also receive Slack notifications when changes are detected.

2. Writeup of the week

Stored XSS via MIME sniffing

This is a great writeup on file upload vulnerabities. The author breaks down how he found a stored XSS through file upload.

I love the way he explains what he did step by step, from detecting which extensions are allowed and which filters are in place, to bypassing them and executing an XSS. A worthy read!

3. Slides of the week

Building Virtual Machine Labs

This is an excellent resource if you want to build a pentest lab.

It’s 453 slides detailing everything: which OS/VMs you need to install (including Kali, Metasploitable 2, Firewall with pfSense, SIEM with Splunk…), how to do it, how to automate OS updates, intro to virtualization, which software you need on each OS (Linux, OS X & Windows) and much more.

I wish I had this when I had just started out. Such a time saver!

4. Conference of the week

Automating the Recon Process by armaan pathan null Ahmedabad Meet 26 May 2019 Monthly Meet & Slides

Armaan (@armaancrockroax) got $21,000 from bug bounty last month. So when he talks about automation, I’m all ears!

In this talk, he shows how he:

  • combines multiple tools to enumerate subdomains
  • resolves and sorts subdomains
  • finds Jenkins with Shodan
  • gets Slack notifications for all scans
  • found a Jenkins RCE in Verizon using this same testing methodology

This is a short, sweet and very practical talk. Code snippets are also provided (check out the slides).

5. Video of the week

Writing a Pentest Report & Sample report

This is an awesome resource for junior penetration testers (and students who want to become professional pentesters). It provides a pentest report template and goes through each page and detail to explain the reasoning behind it.

Of course, this is not meant to be copied and used as as… Every company uses custom report templates for a reason: they tend to elvolve mission after mission, following client feedback and any new ideas that you have.
But this template is an excellent basis. It contains all the important sections and information you want to convey to clients.

Other amazing things we stumbled upon this week



Webinars & Webcasts


Slides only


Medium to advanced

Beginners corner


Challenge writeups

Pentest writeups

Responsible disclosure writeups

Bug bounty writeups

See more writeups on The list of bug bounty writeups.


If you don’t have time

More tools, if you have time

  • Check-LocalAdminHash & Introduction: PowerShell script that can check a password hash against multiple hosts to determine if it’s a valid administrative credential
  • Fast-permute: A fast python tool for creating permutations of alphanumerics. Useful for passord cracking
  • RDPassSpray: Python3 tool to perform stealthier password spraying using RDP
  • ASNLookup Web Application: Web version of ASNLookup
  • Brutality: A fuzzer for any GET entries
  • Boxer: A fast directory bruteforce tool written in Python with concurrency
  • Dexcalibur: Dynamic binary instrumentation tool designed for Android application and powered by Frida. It desassemble dex, analyze, can generate hook, stored intercepted data automatically and do new things from it..
  • Pga4decrypt: A tool for recovering server credentials from a pgadmin4 database
  • Kubolt: Utility for scanning public kubernetes clusters
  • WaybackSqliScanner & Introduction
  • Iptablescript.sh: Bash script to quickly edit iptables. Useful for King of the Hill style CTFs
  • Rdpscan: Rdpscan for CVE-2019-0708 bluekeep vuln & Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)
  • Tickey: Tool to extract Kerberos tickets from Linux kernel keys
  • Gt-generator: Use BloodHound data to generate golden ticket commands without having to do all of those SID lookups!

Misc. pentest & bug bounty resources




Bug bounty / Pentest news



Breaches & Attacks

Other news

Non technical

Tweeted this week

We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 05/24/2019 to 05/31/2019

Curated by Pentester Land & Sponsored by Intigriti

Have a nice week folks!

If you enjoyed reading this, please consider sharing it, leaving a comment, suggestions, questions…