By Intigriti
May 5, 2020
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the week from 24 of April to 01 of May.
postMessage-tracker is a Chrome extension presented by @fransrosen in his “Attacking Modern Web Technologies” talk. It monitors postMessage listeners in all subframes of the window and logs everything, helping find postMessage issues such as XSS and data extraction bugs.
Semgrep is like grep but for code. Both hackers and developers can use it to detect vulnerabilities by looking for anti-patterns in code. Here are two examples of patterns to look for in Go: 1 & 2. Languages supported are Python, JavaScript, Go, Java, C, and soon PHP and Typescript.
This is a very well-written and informative writeup on SSRF. @d0nutptr shares what he looks for when testing SSRF, and 5 interesting bugs he found that earned hime more than $4,800 in total. My main takeaway is to start signing up to apps using Burp Collaborator emails like user@abc123.burpcollaborator.net.
If you receive an HTTP request in addition to the expected SMTP message (email), there is potential for SSRF.
Finally! HOW TO solve the INTIGRITI Easter XSS challenge using only Chrome DEVTOOLS!
Mindset hacking with zseano – What am I thinking when I hack?
Mayonaise Talks About His Recon Workflow, How to Learn Different Topics, and How to Bug Bounty!
Hackers are sharing so much good stuff these days! In this week’s must-see videos:
@securinti solves Intigriti’s latest XSS challenge. He based it on a bug found in a live hacking event, and shares so many cool tips on using Chrome DevTools.
@zseano hacks a Web app live and thinks out loud, sharing his mindset and approach.Mayonaise talks about his recon workflow and hacking approach, automation, learning process…
@stokfredrik shares advice on how to learn new skills, and dealing with duplicates. Personal development applied to hacking!
These are two interesting reads that can help get into a successful bug hunting mindset. @zseano is interviewed about his unique approach and experience, and @sharathsanketh shares some of his realizations as a beginner bug hunter trying to up his game.
Daily-commonspeak2 is an unofficial repo for Commonspeak2 wordlists generated daily. Useful for subdomains recon!
The mobile testing checklist covers both iOS and Android. I like its simple format that helps remember everything to test for, with references and the tools needed.
Bounty Thursdays – Automation, xss challenge, Getallurls, Burp Suite 2020.4, Logger++, hacker101.com
Free Tools! How to Use Developer Tools and Javascript in Webapp Pentests
How I approach a bug bounty program with this #bugbounty methodology & Transcript
Risky Business #581 — Chinese telcos under fire in USA, spy firms pitch COVID-19 surveillance
Hacked Off? 059. – Mike Jones: Anonymous, Suits, and Building Better Security
Security Weekly News #28 – 0 Day Extravaganza, Zoom Can’t Win, & Starbleed – Wrap Up
Security Weekly News #29 – Shade Ransomware, FBI Warnings, & SCADA Attacks
Application Security Weekly #105 – Nintendo Breach, NSA Advisory, & Security of IoMT
Paul’s Security Weekly #648 – iOS Mail Hijack, Hacking Satellites, & 0-Days for Days
IoT Hacking 101 – Firmware Funhouse! (Free registration required)
So, you can read WEB-INF/web.xml. How can you escalate this issue?
Introducing Slacker: Monitoring subdomain additions in real time and automating directory scanning
Subdomain Takeover via GitHub steps [ Point to IP Address ] (Video)
Subdomain Takeover via AWS Elastic Beanstalk with steps (Video)
How to hook Android Native methods with Frida (Noob Friendly)
Old Tricks Are Always Useful: Exploiting Arbitrary File Writes with Accessibility Tools
E-Learning Platforms Getting Schooled – Multiple Vulnerabilities in WordPress’ Most Popular Learning Management System Plugins #Web #CodeReview
CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters #Deserialization #RCE #Web #CodeReview
Exploiting GlobalProtect for Privilege Escalation, Part One: Windows #Windows #PrivilegeEscalation #VPN #RCE
Exploiting Feedback Hub in Windows 10 # Windows #PrivilegeEscalation
Open the Gates! The (In)Security of Cloudless Smart Door Systems #IoT
Arbitrary file read via the UploadsRewriter when moving and issue (GitLab, $20,000)
Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams (Microsoft)
Reflected XSS and sensitive data exposure, including payment details, on lioncityrentals.com.sg (Uber, $4,000)
Stealing the Trello token by abusing a cross-iframe XSS on the Butler Plugin (Trello, $3,600)
Researching Polymorphic Images for XSS on Google Scholar (Google, $9,401.1)
Bitrix WAF bypass (Mail.ru, $300)
[Bug Bounty Writeups] Exploiting SQL Injection Vulnerability ($2,000)
Indirect UXSS issue on a private Android target app ($1,000)
See more writeups on The list of bug bounty writeups.
github-secrets.py: Python script to do a regexp search on GitHub search results
SonarSearch & Introduction: A MongoDB importer and API for Project Sonars DNS datasets
VHosts Sieve: Searching for virtual hosts among non-resolvable domains
Enemies Of Symfony (EOS): Debug mode Symfony looter
@apps3c’s ysoserial fork: Used to generate payloads for @Burp_Suite Java Deserialization Scanner. It adds time, DNS, OS-specific exec and reverse shell (@nickstadb) attack vectors, output transformation, xstream (Isaac Sears)
download-networks.sh: Download all the Shodan data for a list of networks in a text file
Chrome Galvanizer & Introduction: A tool to generate Chrome enterprise policies to help users boost Chrome extension security
Trishul: Burp Extension to hunt for common vulnerabilities including XSS, SQL injection & SSTI
APKEnum & Introduction: A Python Utility For APK Enumeration
WebIDL: New fuzzer to help identify security vulnerabilities in the implementation of WebAPIs in Firefox
Nozaki: Security oriented HTTP fuzzer engine
DevToolReader & Introduction: Python script that parses Indexeddb files – used to extract Firefox DevTools console history
pwncat: Netcat on steroids with Firewall and IPS evasion, bind and reverse shell, local and remote port-forward
SitRep: Extensible, configurable host triage
jbosswidlyfly_to_hashcat.py: Python 3 script to convert JBoss/Wildfly user properties list to hashcat mode 20
AzureADLateralMovement & Introduction: Bloodhound for Azure AD
Pivotnacci: A tool to make socks connections through HTTP agents
Wifipumpkin3: Powerful framework for rogue access point attack
Writing a scanner to find reflected XSS vulnerabilities — Part 1, Part 2 & Code
Working-As-Intended: RCE to IAM Privilege Escalation in GCP Cloud Build
Top Attacks Against Financial Services Organizations 2017–2019
Kaspersky: RDP brute-force attacks have gone up since start of COVID-19
Android OEM patch rates have improved, with Nokia and Google leading the charge
Microsoft Teams accounts could be hijacked via malicious GIFs & TL;DR
Salt peppered with holes? Automation tool vulnerable to auth bypass: Patch now
Sophos XG Firewall zero-day vulnerability gets patched & CVE-2020-12271: Sophos XG Firewall Pre-Auth SQL Injection Vulnerability Remediation Guidance and Exposure Overview
Sophisticated Android Spyware Attack Spreads via Google Play
This new Android mobile malware targets banks, financial services across Europe
Lucy malware for Android adds file-encryption for ransomware ops
PerSwaysion Campaign – Playbook of Microsoft Document Sharing-Based Phishing Attack
ICANN has voted to REJECT the sale of the .ORG registry to private equity firm Ethos Capital
Shade (Troldesh) ransomware shuts down and releases decryption keys
Here’s the NSA’s guide for choosing a safe text chat and video conferencing service
Facebook-NSO lawsuit: Hundreds of WhatsApp attacks linked to one IP address
NSO Employee Abused Phone Hacking Tech to Target a Love Interest
Cybersecurity professionals being sidetracked by coronavirus home-working drive
Microsoft warns of malware surprise pushed via pirated movies
Malicious advertising slingers up the ante during Covid-19 pandemic
Split opens up in Europe on privacy control for Covid-19 contact-tracing apps
Payment Card Industry (PCI) – Recurring Requirements Require Attention!
The Duality of Attackers – Or Why Bad Guys are a Good Thing™
A game changer technology – Quantum Security Series – Part 1
We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 04/24/2020 to 05/01/2020.
Curated by Pentester Land & Sponsored by Intigriti