The 5 Hacking NewsLetter 35

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 28 of December to 04 of January.

T5HN35.png

Our favorite 5 hacking items

1. Tool of the week

Interlace

This tool is a must for both pentesters and bug hunters! We often need to run commands (like Nmap, Amass, Nikto…) on a list of targets. Interlace allows speeding up this process.

Give it the command you want to run, the target file/domain/network and a number of threads like this:

# time interlace  -tL test.txt -p 443 -threads 5 -c "nikto -host https://_target_"
==============================================
Interlace v1.0	by Michael Skelton (@codingo_)
==============================================
[17:35:54] [THREAD] [nikto -host https://kinepolis.com] Added to Queue 
[17:35:54] [THREAD] [nikto -host https://facebook.com] Added to Queue 
[17:35:54] [THREAD] [nikto -host https://nexuzhealth.be] Added to Queue 
- Nikto v2.1.6
- Nikto v2.1.6
...

It starts one thread per target and runs the command you gave it on the different targets simultaneously. In other words, it easily turn single threaded command line applications into a fast, multi-threaded application.

More …

The 5 Hacking NewsLetter 34

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 21 to 28 of December.

Also, I wish you and your family a very happy new year, full of bugs, bounties, fun, health & happiness!

T5HN34.png

Our favorite 5 hacking items

1. Tip of the week

Did you know you can smuggle payloads in a valid e-mail address using round brackets?

I love the technical tricks for bug hunters that @intigriti shares on Twitter. I regularly add them to the tweets collection at the end of this newsletter.

But this trick in particular blew my mind! Here’s why: Have you ever tested a login or contact form, entered a valid email address, intercepted the request with Burp, then replaced the email with XSS/SQLi/SSTI/RCE detection payloads? This is a way to bypass client-side validation of the email field. So what do you do if you get an “invalid email” response from the server?

To me, its was the end of testing for input validation on that field because the check is done server-side.

But according to @securinti, you can smuggle any payload and trick the server into believing that it’s a valid email by putting the payload between round brackets: [email protected](${}<>'/"*-)domain.com or yourname(${}<>'/"*-)@domain.com.

Amazing, right? I can’t wait to re-test all forms in my bug bounty notes.

More …

The 5 Hacking NewsLetter 33

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 14 to 21 of December.

T5HN33.png

Our favorite 5 hacking items

1. Conference of the week

KringleCon 2018

Kringle con, Kringle con, Kringle all the way… Oh what fun it is to watch hacking conference talks!
Hum, sorry for the little “Jingle bells” song hijacking, I couldn’t help it!

More seriously, this is a great set of talks for penetration testers. They’re rather short (approximately between 6 and 25 minutes), but are all interesting and cover many different topics: Kubernetes security, web app security (relevant for bug hunters), malwares, forensics, social engineering, and even community building (non technical talk).

If you haven’t already watched them, it could be fun to do a KringleCon marathon. Bring the popcorn!

More …

The 5 Hacking NewsLetter 32

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 07 to 14 of December.

T5HN32.png

Our favorite 5 hacking items

1. Slides of the week

Hidden Gems in APKs

This is a great resource to learn more on testing Android apps. A lot of interesting information can be gathered even if the talk itself isn’t available.

The presentation includes three parts:

  1. How to analyze an APK and where to find vulnerable code
  2. Two cases studies with many examples of vulnerabilities found on real apps, plus other random findings
  3. Tools used: scanapk, kpa_esrever and kpa_esrever (couldn’t find them anywhere)
More …

The 5 Hacking NewsLetter 31

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 30 of November to 07 of December.

T5HN27.png

Our favorite 5 hacking items

1. Conference of the week

BSides Lisbon 2018, especially:

If you’re a professional pentester or looking for a pentesting job, then you should really watch the talk “How To Build Your Own Infosec Company”. It tackles a lot of topics: the advantages of small vs big pentesting companies, how to grow your own name and find your first client, how to organize your work and emails, plus many other tips.

More …