By Anna Hammond
March 24, 2021
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the week from March 15 to 22.
Intigriti’s 0321 XSS challenge
H2C Smuggling in the Wild & h2cSmuggler
How I hacked Facebook: Part Two (Facebook, $54,800)
@seanyeoh published amazing research on H2C smuggling. He built on Jake Miller’s research on this vulnerability and exploited it in cloud providers that were initially considered not vulnerable.
The second writeup is about a cool bug chain that allowed @alaa0x2 to access a Facebook employee’s account and to compromise Facebook’s internal network. It involves SSRF, account takeover and cookie manipulation.
How we found and fixed a rare race condition in our session handling
GitHub released details about an interesting bug they fixed. It’s a race condition in their session handling that caused users logged into github.com to randomly be authenticated as other users.
Hacking into Google’s Network for $133,337
Networking Fundamentals & Slides
Two videos of very different flavors: The first one is @LiveOverflow interviewing @epereiralopez about winning the 2020 Google Cloud Platform VRP Prize and the RCE that made it possible. So inspirational!
The second video is an excellent primer on networking fundamentals by @TomNomNom.
Burp Suite – solving E-mail and SMS TAN multi-factor authentication with Hackvertor custom tags
Attack Surface Analysis – Part 2 – Custom Protocol Handlers
If you’re not familiar with the Hackvector Burp extension, the first tutorial shows cool examples of its usage and capabilities (e.g. how it helps automate MFA authentication).
In the second tutorial, @CryptoGangsta dives deep into the attack surface of custom protocol handlers. It’s an excellent read, packed with information for hackers interested in destop apps.
Ways to alert(document.domain)
@TomNomNom shared this list of ~40 ways to execute alert(document.domain). It’s old and somehow I’m just finding out about it, but it’s still very relevant for bypassing WAFs and regexes.
Hunting for bugs in GraphQL APIs (Demo) & Live GraphQL Q&A Session
SQL Injection – Lab #3 SQLi UNION attack determining the number of columns returned by the query
WE GOT BREACHED! – An attack and defense scenario using custom Malware and Defender For Endpoints!
Watch Hackers Demonstrate a Ransomware Attack (ft. Kilian from SecurityFWD)
DAY[0] Episode 69 – Fast Fuzzing, Malicious Pull Requests, and Rust in my kernel?!
What the FLoC? – Automatic Fix for Exchange Server Flaw, Firefox 87 Features, MyBB Patch
Make Burp Community feel a little more like Burp Professional
The most common on premises vulnerabilities & misconfigurations
Anatomy of the Session Management Tests & Session Management All-In-One
F5 Discloses Eight Vulnerabilities—Including Four Critical Ones—in BIG-IP Systems & wvu-r7’s assessment of CVE-2021-22986 #Web
DuckDuckGo Privacy Essentials vulnerabilities: Insecure communication and Universal XSS #Web
Hack the Stack with LocalStack: Code Vulnerabilities Explained #Web
[CVE-2021-28379] Abusing file uploads to get an SSH backdoor #Web
All my Intune users could become Local Administrators and it’s a Feature? #Cloud #LPE
Exploiting remote DoS vulnerability in my not-so-smart TV #IoT
Stealing arbitrary GitHub Actions secrets (GitHub, $25,000)
TikTok for Android 1-Click RCE (TikTok)
How to Harpon Big Blue! (IBM)
CVE-2021-27076: A Replay-style Deserialization Attack Against Sharepoint
How I made it to Google HOF? (Gogole, $1,000)
See more writeups on The list of bug bounty writeups.
normal.py: Find unicode codepoints to use in normalisation and transformation attacks
UnChain: A tool to find redirection chains in multiple URLs
gitlab-unauth-parser & Intro: Parses unauthenticated Gitlab APIs for users, repos, groups and secrets
xeuledoc: Fetch information about a public Google document
Spectroscope: Chrome extension that helps search for endpoints potentially vulnerable to Spectre
nList: An nmap script to produce target lists for use with various tools
Get a very good subdomain list without any tool using GitHub DNS block listing
Query Shodan like it’s a SQL database using a Steampipe integration
GitLab: How we found and fixed a rare race condition in our session handling
Bypass Strict Input Validation With Remove Prefix and Suffix Patterns & Challenge
Another approach to portable Javascript Spectre exploitation
Is Responder part of your pentest/red team workflow? It needs your support to continue existing!
HackerCon (March 27)
Well done, @sunilyedla2! Continue keeping calm and hacking, it suits you 🙂
Want to share your bug bounty wins, swag and joys with other Bug Bytes readers? Tag us on social media, we’d love to hear from you too!