The 5 Hacking NewsLetter 102

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 10 to 17 of April.

T5HN102.png

Our favorite 5 hacking items

1. Resource of the week

Attacking and Auditing Docker Containers and Kubernetes Clusters

After last week’s training on AWS and Azure, @appseccouk is now generously open sourcing another complete training course. This one is about hacking Docker containers and Kubernetes clusters. It includes documentation, Docker Lab virtual machines and an intentionally vulnerable Kubernetes cluster (Google Cloud).

More …

The 5 Hacking NewsLetter 101

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 03 to 10 of April.

T5HN101.png

Our favorite 5 hacking items

1. Article of the week

Same Same But Different: Discovering SQL Injections Incrementally with Isomorphic SQL Statements

This is an excellent article on detecting SQL injections in a way that triggers less WAFs, and is more efficient than blindly firing random payloads.

The idea is to submit payloads that would have the same value if not properly sanitized (e.g. ?ID=1 and ?ID=2-1). If the output is the same, especially in multiple occurrences on the app, it indicates potential SQL injections. What can be automated is not the final payload, but testing for interesting behavior that calls for more manual tests.

This is not a new technique. @spaceraccoonsec shows examples of tools and research based on the same idea. But maybe this is the new way to test for injections in hardened targets.

More …

Free online conferences calendar

Hi! As you probably noticed, the number of online talks exploded since most people are in lockdown.

So, this is a little calendar of free online conferences and meetups for bug hunters and pentesters scheduled for the next few weeks.

If you know any other interesting ones, you can share them as a comment or on Twitter, and I’ll update the list.

conference-calendar.png


See you next time!


The 5 Hacking NewsLetter 100

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 27 of March to 03 of April.

T5HN100.png

Our favorite 5 hacking items

1. Slides of the week

Attacking Secondary Contexts in Web Applications

@samwcyo’s Kernelcon talk explores attacking various secondary contexts (APIs, reverse proxies, middleware) in Web applications. He shows how to detect application routing (in black box), and examples of vulnerabilities that can result from interactions between different servers.

This is excellent research and an interesting area to explore further. The talk video is not available yet, but will be released soon hopefully.

Also good to know, you can reproduce the last trick (Authy 2FA bypass) in @PentesterLab’s “Idor to Shell”.

More …

The 5 Hacking NewsLetter 99

Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 20 to 27 of March.

T5HN99.png

Our favorite 5 hacking items

1. Article of the week

Solving CAPTCHA using Burp suite proxy and mitmproxy

The first article shows a solution for testing Web apps that have a short session timeout and log you out everytime you trigger an exception, and that also require solving a captcha to log in. The captcha makes it complicated to use Burp macros, the traditional way of handling sessions. @dinosn’s method is to chain Burp with mitmproxy, another proxy that detects logouts and calls a custom script to run tesseract OCR and solve captchas.

More …