The 5 Hacking NewsLetter 8

Hey hackers! As usual, this is a collection of our favorite resources for penetration testers and bug bounty hunters. It covers the week from to the 8th to the 15th of June.

There’s a lot to read, so grab a nice plate of watermelon (yeah, it’s summer baby!) and good reading!

T5HN8.png

Our favorite 5 hacking items

1. Tutorial of the week

Should this be public though? by Rojan Rijal

This tutorial presents great OSINT techniques for finding sensitive information leaked by employees.
A tool, LeakFinder, is also provided to automate the process. The author used it successfully on 2 bug bounty programs but the reports have not yet been disclosed.

More …

The 5 Hacking NewsLetter 7

Hey hackers! Once again, I scoured the Web to get you the best resources on hacking, pentesting and bug bounty hunting shared this week.

I’m publishing this a little late because there’s a lot of research involved and, well, sometimes life gets in the way… So the week covered is from the 1st to the 8th of June.

Have fun reading this, and don’t forget to share, retweet, comment, ask…!

T5HN7.png

Our favorite 5 hacking items

1. Webcast I enjoyed watching

Attack Tactics Part 1 by Black Hills Information Security

This is a great webcast! I loved watching it for all the state of the art information, tips and feedback from professional pentesters.

More …

The 5 Hacking NewsLetter 6 (New format)

Hey, hackers!
OMG, this week there were even more interesting things published & shared accross Youtube, Twitter, Medium, blogs, etc, than last time!
It was just impossible to choose only 5 items, and this is becoming a habit. So we’re trying a new format: Our 5 favorite items (just a matter of personal preference) commented, followed by all the other fantastic findings in the form of a list of links.

Let me know if you prefer this format or the older one, and if you have any suggestions or comments. It’s always a pleasure to hear from you!

T5HN6.png

Our favorite 5 hacking items

1. Writeup of the week

I love the simplicity yet effectiveness of this technique. It was rewarded $1,500 and shows (yet again) the importance of recon, particularly retrieving and analyzing certificates from censys.io.

More …

The 5 Hacking NewsLetter 5

T5HN4.png Hi, hackers! This week, it was particularly hard to select only 5 items. The hacker community is so prolific these days! But we had to choose, so other interesting findings of this week will probably appear in our next newsletters.

Now, here is our weekly selection, take a comfortable seat and enjoy!

1. Writeup of the week

Getting read access on Edmodo by Shawar Khan

This is a nice example of how to exploit a SSRF. If you are learning about this vulnerability type, it’d be helpful to dissect the article and add all the tips and steps to your methodology.

More …

The 5 Hacking NewsLetter 4

Hi, I’m very happy to present you this week’s five items! After a few weeks break due to rich personal circumstances, it is time to resume our weekly shenanigangs…

T5HN4.png

1. Collection of hacker conferences

https://infocon.org/

This site is a “Hacking conference archive”. It gathers presentation videos and slides from a lot of conferences, documentaries, podcasts and also rainbow tables. I love going through it to discover new conferences and talks from around the world!

More …