Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the weeks from October 9th until October 15th.
Intigriti News
- We spoke to Kuromatae666 about going full-time bug hunting
- October XSS challenge
- Breaking down our code snippet challenge
From my notebook
This week’s theme is about finding those unique bugs no one has ever found, bug bounty is competition with the reward only given to the first to find a bug. I often recommend what I call low-competition bug bounty hunting, so my top 5 for this week are all thoughts/advice on how to stop competing with everyone else and start finding new unique bugs.

- The prerequisites: Things you need to learn before getting into Web hacking/bug bounties by Manas Harsh – Manas shares the fundamentals of web security, programming, networks, Linux, cloud, and databases, this is a great blog post that really breaks down the need to know of bug bounty
- Rhynorater shares his tips from Live Hacking events – After competing in many live hacking events against and alongside some of the best hackers in the world, he gives some advice about collaboration, choosing targets and more
- NahamSec’s Smart Contract Series – This series was released while we were on hiatus but it’s a great introduction to web 3 hacking, and of course, new tech is often less explored!
- [Hacking Banks] Broken Access Control Vulnerability in Banking application [PART I] and [Hacking Bank] Broken Access Control Vulnerability in Banking application [PART II] – Broken access control seems like a really simple vulnerability, but this series by protostar0 shows how deep he went to find some on a banking application
Other Amazing Things

- BEGINNER Golang CSV Quiz Game – Gophercises
- I WENT TO DEFCON 30!
- BloodHound Tutorial
- Live TV Hacked In Iran…
- Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
- ACCESS what you WERE NEVER SUPPOSED TO
- WorldGuard Bypass
- NullCon Cybersecurity Interview With Vandana Verma
- VULNERABLE File Uploads (Python Django)
- BSides Ahmedabad vlog!!! @BSides Ahmedabad
- The Hacking Empire Built on Discord
- SSRF POST via HTML Form [Perspective – HackTheBox]
- HackTheBox – Perspective

- Naked Security S3 Ep104: Should hospital ransomware attackers be locked up for life? [Audio + Text]
- Deviant Ollam Picks the Lock to Adam’s Heart
- How Penetration Testing Reporting is Evolving with Shaun Peapell & Tom Ellson CyberTech Talks
- We Hack Purple Podcast Episode 58 with Guest Anshuman Bhartiya
- Between Two Nerds: Using Offensive Capabilities Against Criminals

- CI/CD Pipelines: The new Eldorado
- Meta iOS Hunting
- Gone in 60 {Seconds,Minutes,Hours}: Learning from Real-World Breaches
- Tips, Advice and Recommendations for Computer Science Students

- All about JWT attacks (tools included)
- [Writeup] Vault game — Hats Finance CTF#2
- Vulnerabilities in Online Payment Systems
- Everything About Path Traversal Vulnerability
- EXPLOITING OS COMMAND INJECTION VULNERABILITIES
- Gcash Vulnerability Walkthrough
- Front-Run a Smart Contract
- Finding P1 Vulnerabilities: A Step by Step Guide
- The easiest bug to get a Hall of fame from a Billion dollar company.
- Network Footprinting With Maltego
- IDOR + Controle de acesso quebrado.
- Why do Deserialization Vulnerabilities occur?
- OSCP Cheat Sheet
- Inserting a Backdoor into a Machine-Learning System
- HOW A SLOW INTERNET, GOT ME 50$
- CVE-2022–41040 Microsoft Exchange vulnerable to server-side request forgery
- Broken Access Control leads to full team takeover and privilege escalation
- AWS S3 bucket Misconfigurations and Exploitations
- Fall account takeover via Amazon Cognito misconfiguration
- Cyberattackers Spoof Google Translate in Unique Phishing Tactic
- Public Bug Bounty and Vulnerability Disclosure programs with less competition.
- Google SSO misconfiguration leading to Account Takeover
- My Learning Methodology for Web Security
- CVE-2022–33077: IDOR to change address of any customer via parameter pollution in nopCommerce <= 4.5
- Web application firewall bypass

- Havoc Framework C2
- HSTP – Simple Hyper Service Transfer Protocol On Networks
- Exceptional Tool? Nginxpwner to Test and Run for Nginx Security and Bug Bounty
- SteaLinG – Open-Source Penetration Testing Framework Designed For Social Engineering
- Recon Tool: Collector
- GitHub – nvbn/thefuck: Magnificent app which corrects your previous console command.

- Use burp collaborator for @company.com registration requirements
- Automating REST Security Part 1: Challenges
- Top Programming Languages For Pentesters

- Hack the Boo by Hack the Box
- ICS CTF
- Hack a Sat finale
- Red Team 5 CTF
- Sub-Saharan Africa Regional Cybersecurity CTF 2022
- No Hat CTF
- Account Takeover Labs – be practical
- h4ck1ng.google

- Former Uber Security Chief Found Guilty of Data Breach Coverup
- Zimbra RCE Bug Under Active Attack
- Optus data breach prompts pincer movement of twin regulatory probes
- Fortinet Warns of Active Exploitation of Newly Discovered Critical Auth Bypass Bug
- $10,000 Prize Pool in SO-COL’s Bug Bounty
- Does the OWASP Top 10 Still Matter?

- Make your neighbor think their house is haunted by blinking their Ikea smart bulbs
- Mastercard moves to protect ‘risky and frisky’ crypto transactions
- 91% of Cyber Pros Experience Mental Health Challenges at Work
- Automotive Security Threats Are More Critical Than Ever
- India set to extend deadline for absurd infosec reporting requirements