By Anna Hammond
February 3, 2021
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the week from January 25 to of February 1st.
Baron Samedit bug, Zhang Guo deception, SAP attacks & DDoS via RDP
findhunters is a platform by @sametsahinnet for findings hunters that want to collaborate. You can announce that you’re looking for collaborators, which payout split you want, the type of testing, vulnerability or target you’re interested in, etc. It’s a great idea as it may help you reach people you wouldn’t have otherwise known.
Applying Offensive Reverse Engineering to Facebook Gameroom (Facebook)
@spaceraccoonsec has a talent for explaining complex vulnerabilities and findings. With this writeup, we learn about an insecure deserialization bug he discovered on Facebook Gameroom (a Windows-native client) during Bountycon.
Burp Suite BApp Management for Pentesters and Bug Bounty Hunters
Commonly Misunderstood Bugs: DDoS & DOS
Bug Bounty Fundamentals: Scope
If you want to level up your bug hunting game, @codingo_‘s Youtube channel is a really good place to start. These three new videos are short but packed with information on how to test for Denial of Service vulnerabilities in bug bounties, how to approach scope, and how to manage Burp extensions and configuration.
@jub0bs lifts the veil on a common misconception about the SameSite cookie attribute. It’s an excellent read that helps understand the difference between a site and an origin, and why conflating the two can lead to vulnerabilities.
XSSTRON is an Electron JS Browser that passively detects XSS while you are browsing. It can find reflected, stored and DOM XSS with support of POST requests. I haven’t tested it yet, but it is from @RenwaX23 who (judging from their Twitter feed and challenges) know a thing or two about XSS.
Bounty Thursdays #24 – TOP 10 web penetration testing techniques of 2020???
Blind Cross Site Scripting (XSS) Overview – Bug Bounty Hunting & Web App Pentesting
Android Pentesting – Android Architecture + Static Analysis with apktool + gf + jadx – Pt. 01
NAT Slipstreaming 2.0 – SUDO Was Pseudo Secure, BigNox Supply-Chain Attack, iMessage in a Sandbox
DAY[0] Episode 62 – OSED, North Korean hackers, NAT Slipstream 2.0, and PGP (in)security
Don’t stop at alert(1): Demonstrate impact with low severity bugs
Keeping your GitHub Actions and workflows secure: Untrusted input
Bad Neighbor on FreeBSD: IPv6 Router Advertisement Vulnerabilities in rtsold (CVE-2020-25577) #IPv6
NAT Slipstreaming v2.0: New Attack Variant Can Expose All Internal Network Devices to The Internet #Network
Exploiting the Nespresso smart cards for fun and profit coffee #SmartCard
YouPHPTube <= 10.0 and 7.8 multiple vulnerabilities #Web #CodeReview
Launching Internal & Non-Exported Deeplinks On Facebook (Facebook, $4,000)
Analysing Crash Messages To Achieve Blind Root Command Injection
How We Escaped Docker in Azure Functions (Microsoft)
Applying Offensive Reverse Engineering to Facebook Gameroom (Facebook)
nextcloud-snap CircleCI project has vulnerable configuration which can lead to exposing secrets & Shaking secrets out of CircleCI builds – insecure configuration and the threat of malicious pull requests
Weird functionality leads to Account Takeover (Millions of Users affected) ($4,000)
See more writeups on The list of bug bounty writeups.
Bludger & Intro: GitHub Actions Automation Framework for the command line
frogy-subdomain-enumeration: Subdomain enumeration tool in Bash (with recursion over N level of subdomains)
NtHiM (Now, the Host is Mine!): Fast sub-domain takeover detection in Rust, based on can-i-take-over-xyz data
Name-that-hash: Hash identification tool
A bug bounty hunting journey (Ebook at $9.99)
Conda (Youtube channel)
A Special Attack Surface of the Android System (1): Evil Dialog Box
Silencing Microsoft Defender for Endpoint using firewall rules
How to turn your cybersecurity hobby into a career – An Introduction to Bugbounties: March 15
CactusCon: February 5-6
See how badass @DattanaMayank looks! Congratulations for the cool bug(s) behind these RedBull crates!
We’d love to hear from you too about your bug bounty wins, swag and joys. Tag us on social media if you want to share them with other Bug Bytes readers.