By travisintigriti
February 22, 2023
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the weeks from February 13th to February 19th
Intigriti News
Intigriti’s February Challenge is over! Check out the cool write ups!
Safe harbor legal framework for ethical hacker officially launches in Belgium
From my notebook
This week we saw the release of the top 10 web hacking techniques for 2022 Something that jumped out at me is that they are either very technical and rely on you knowing a lot about how a piece of technology works, or very logical and require you to go through a lot of steps and break the flow. It’s cool to see OAuth take the top spot here, it’s always been a technology that a lot of developers implement but flows can be complex so it’s often insecure! Other articles for this week include some different perspectives on Bug Bounty hunting with a triager, program manager and bug hunter, some fun news and views from Critical Thinking and a list of missing CVEs in nuclei templates in case you’d like to contribute to the community.
Weekly updated list of missing CVEs in nuclei templates official repository
Confessions of a bug bounty program manager & Confessions of a top-ranked bug bounty hunter
The View from the Other Side: A Security Analyst’s Perspective on Bug Bounty Triage
Episode 7: PortSwigger Top 10, TruffleSecurity Drama, and More! (I also liked this one that I forgot to include last week! Episode 6: Mobile Hacking Attack Vectors with Teknogeek (Joel Margolis))
Other Amazing Things
Srsly Risky Biz: North Korean ransomware, Biden flags US privacy reform
Synthetic voices, ChatGPT reflections, and social skirmishes
SN 910: Ascon – Malicious ChatGPT Use, Google Security Key Giveaway, OTPAuth
EP108 How to Hunt the Cloud: Lessons and Experiences from Years of Threat Hunting
Zseano struggles to find a bug so he’s taking a little break
Nahmsec: You have a reverse shell/RCE and you can only run one command and one command only
Executing Custom Database Scripts from an Un-authorized Roles.
Level Up Your Cybersecurity Game: 100 Places to Hone Your Ethical Hacking Skills
Introduction to SSRF Exploitation: A Practical Tutorial for Ethical Hackers — StackZero
ChatGPT Hacking Prompts, SQLi, XSS, Vuln Analysis, Nuclei Templates, and more
Building a one-shot recon script with Project Discovery tools
Hacking Apple: Two Successful Exploits and Positive Thoughts on their Bug Bounty Program
For the first time in Kurdistan and Iraq, we organized a hacking AND CTF challenge conference
Hacking the Search Bar: The Story of Discovering and Reporting an XSS Vulnerability on Bing.com
Found an URL in the android application source code which lead to an IDOR
Stealing in motion. Immunefi bounty hunting from different ANGLE.
The Inside Story of Finding a Reverse Transaction Vulnerability in a Financial Application
I GOT UNITED NATION’S HALL OF FAME WITH THIS SIMPLE TECHNIQUE!
Bypassing CORS configurations to produce an Account Takeover for Fun and Profit
Bypassing SameSite=lax cookie restrictions to preform CSRF resulting to a horizontal privilege…
Blind Time-based SQL injection vulnerability in an Indian government website
Reverseip_Py – Domain Parser For IPAddress.com Reverse IP Lookup
Upload_Bypass_Carnage – File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!
Fearless CORS: a design philosophy for CORS middleware libraries (and a Go implementation)