Conference notes: Trickle Down PwnOnomics (LevelUp 0x02 / 2018)

trickle-down-pwnonomics.png Hi, these are the notes I took while watching the “Trickle Down PwnOnomics” talk given by Darrell Damstedt (aka Hateshape) on LevelUp 0x02 / 2018.


  • This talk is about how Hateshape “went from having zero bug bounty experience to regularly experiencing ($$$) success”.
  • Trickle Down Pwnonomics: A theory promoting the discovery and reduction of vulnerabilities on a bug bounty program as a means to stimulate my bank account.
More …

The 5 Hacking NewsLetter 8

Hey hackers! As usual, this is a collection of our favorite resources for penetration testers and bug bounty hunters. It covers the week from to the 8th to the 15th of June.

There’s a lot to read, so grab a nice plate of watermelon (yeah, it’s summer baby!) and good reading!


Our favorite 5 hacking items

1. Tutorial of the week

Should this be public though? by Rojan Rijal

This tutorial presents great OSINT techniques for finding sensitive information leaked by employees.
A tool, LeakFinder, is also provided to automate the process. The author used it successfully on 2 bug bounty programs but the reports have not yet been disclosed.

More …

The 5 Hacking NewsLetter 7

Hey hackers! Once again, I scoured the Web to get you the best resources on hacking, pentesting and bug bounty hunting shared this week.

I’m publishing this a little late because there’s a lot of research involved and, well, sometimes life gets in the way… So the week covered is from the 1st to the 8th of June.

Have fun reading this, and don’t forget to share, retweet, comment, ask…!


Our favorite 5 hacking items

1. Webcast I enjoyed watching

Attack Tactics Part 1 by Black Hills Information Security

This is a great webcast! I loved watching it for all the state of the art information, tips and feedback from professional pentesters.

More …

The 5 Hacking NewsLetter 6 (New format)

Hey, hackers!
OMG, this week there were even more interesting things published & shared accross Youtube, Twitter, Medium, blogs, etc, than last time!
It was just impossible to choose only 5 items, and this is becoming a habit. So we’re trying a new format: Our 5 favorite items (just a matter of personal preference) commented, followed by all the other fantastic findings in the form of a list of links.

Let me know if you prefer this format or the older one, and if you have any suggestions or comments. It’s always a pleasure to hear from you!


Our favorite 5 hacking items

1. Writeup of the week

I love the simplicity yet effectiveness of this technique. It was rewarded $1,500 and shows (yet again) the importance of recon, particularly retrieving and analyzing certificates from

More …

The 5 Hacking NewsLetter 5

T5HN4.png Hi, hackers! This week, it was particularly hard to select only 5 items. The hacker community is so prolific these days! But we had to choose, so other interesting findings of this week will probably appear in our next newsletters.

Now, here is our weekly selection, take a comfortable seat and enjoy!

1. Writeup of the week

Getting read access on Edmodo by Shawar Khan

This is a nice example of how to exploit a SSRF. If you are learning about this vulnerability type, it’d be helpful to dissect the article and add all the tips and steps to your methodology.

More …