Bug Bytes #163 – Uber Eats payment bypass, Mystery lab challenge & 1337Up livestream

By Anna Hammond

March 16, 2022

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.

CLICK HERE TO SUBSCRIBE

This issue covers the week from March 7 to 14.

Intigriti news

“Bug Bounty Write-Ups” community

We have a brand new Twitter community!

It is a place where you can share with us your bug bounty writeups, and stay informed of the latest and most informative writeups.

Join now

Our favorite 5 hacking items

1. Vulnerability of the week

What caused the Uber Eats glitch that allowed ordering free food for a weekend in India?

@GergelyOrosz explains a bug in Uber Eats that allowed students in India to order around $14,000 of food for free. All because of a small change in an API endpoint related to idempotency…

2. Resource of the week

PortSwigger: Introducing the mystery lab challenge

If you’ve completed all Web Security Academy challenges and wondered what’s next, you will love this! PortSwigger introduced a new functionality, the “Mystery lab challenge”, that can generates realistic labs where the bug type is not known beforehand.

3. Conferences of the week

Amazon Cognito (Mis)Configurations – BSides Ahmedabad 2021
1337UP LIVE Conference (livestream)

The first talk is a walkthrough of Amazon Cognito misconfigurations by @sheth_kavisha. She goes over how AWS Cognito works and common attack vectors. To go further, here are other resources recommended by @yassineaboukir.

Another conference worth your time is Intigriti’s 1337UP LIVE Conference. The livestream is up on Youtube and is a fantastic opportunity to learn about topics like how to find your first bug, 2FA vulnerabilities, creating bug bounty tools, mobile app hacking, OSINT in bug bounty, a cool red teaming story and more.

4. Article of the week

Finding Gadgets Like It’s 2022 & QLinspector

@hugow_vincent shares a new methodology to find deserialization gadget chains in Java apps using CodeQL.
It has some limitations like the necessity to have the app’s source code and being able to compile it, but it can help when tools like Yoserial and gadget inspector fail to find valid chains.

5. Tutorial of the week

iOS Hacking – A Beginner’s Guide to Hacking iOS Apps [2022 Edition]

A lot of mobile hacking tutorials show only the first steps to set up your testing environment and stop there. This one goes further, explaining not only jailbreaking and seting up your environment with Linux as a host, but also how to actually start testing iOS apps using both static and dynamic analysis.

SHARE ON TWITTER

Other amazing things we stumbled upon this week

Videos

Webinars

Slides & Workshop material

Tutorials

Writeups

Challenge writeups

Responsible(ish) disclosure writeups

Known vulnerabilities

Bug bounty writeups

See more writeups on The list of bug bounty writeups.

Tools

  • bypass-url-parser: Bash script that tests many URL bypass techniques to reach a 40X protected pages

  • reflector: A crawler that tests HTML forms for reflection (based on hakrawler)

  • tew: A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation

  • GraphQL Cop: Security Auditor Utility for GraphQL APIs

  • scant3r: Module based Bug Bounty Automation Tool

  • swaggerHole: A python3 script searching for secret on SwaggerHub

Tips & Tweets

Misc. pentest & bug bounty resources

Articles

Challenges

Bug bounty & Pentest news

Non technical

You may also like