By Intigriti
May 7, 2019
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series are curated by Mariem, better known as PentesterLand. Every week, she keeps us updated with a comprehensive list of all write-ups, tools, tutorials and resources we should not have missed.
Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.
This issue covers the week from 26 of April to 3 of May.
5 super important main-app testing tips for bug bounty hunters with STOK&Haddix
Any video by @stokfredrik & @jhaddix is a must watch! This one has 5 crucials things you want to do as a bug hunter:
Don’t limit yourself to the external attack surface. Log in as different users & try to find where the sensitive functionality is => access controls bugs & IDOR
Find out how the site references you as a user (& what you’re allowed to do) => IDOR, File upload, RCE
Test all parameters => SSRF, LFI, RFI, Path traversal
Content discovery => hidden paths, private data leakage => Authentication bypass, logic flaws
Find out which business flaws the target cares about (other than technical bugs)
But this is not all. Watch the video. It’s short but full-packed with information!
Nullcon Goa 2019, especially:
– Best Of Google VRP 2018
– How To Use Bug Bounty To Start A Career In Silicon Valley
– Automating Security Testing with Functional Testing Test Cases
– Getting to $10,000 – the variables at play in determining bounty awards
– Introducing the ASVS 4.0
– Interview with Robert Baptiste aka Elliot Alderson [@fs0c131y]
I really recommend watching the talk “How To Use Bug Bounty To Start A Career In Silicon Valley”. It has awesome advice on leveraging bug bounty hunting to build a solid resume and find a job in Silicon Valley (or anywhere else). This includes which bugs and programs to focus on, which pitfalls to avoid, etc.
“Best Of Google VRP 2018” is also a good resource for bug hunters who want to succeed with Google VRP. Some of the advice applies to other programs too (like specializing in a product/attack vector).
This is an excellent interview of @securinti. What I like about it most is that the interviewer, @\_zulln, is also a hacker. So unlike most interviews of this sort, the questions and answers are very technical and mindblowing for anyone starting out as a bug hunter.
I highly recommend this read if you want to find out what sets apart successful bug hunters from beginners.
Here are some interesting excerpts:
“Many hackers look for bugs, I look for attack scenarios and then for the bugs. And it works for me as I get fewer duplicates. The downside is that I spend time researching ideas that sometimes yield nothing.”
“Scanners do not detect logical bugs, because to detect them you need context, you need to understand the application and the business logic. While everyone is looking for XSS I am just reading the docs.”
If you’re interested in Android app hacking, checkout this workshop. It’s about reverse engineering Android apps and includes both theory and exercises. Just awesome!
So many hackers suffer from at least of the mental struggles mentioned in this article: imposter syndrome, burnout, anxiety and depression.
I hear/read more and more testimonies on this especially on Twitter, and I have similar experience myself. Hacking involves so much learning/change/stress…
So it’s nice to know that I am/we are not alone in this. And it is helpful to read a fellow hacker’s perspective on these issues, and how he deals with them.
We’ve made a conclusive write-up about our XSS Challenge in April. More than 100k people saw the challenge, but only 90 researchers were able to solve it. Do you want to know how? Read the solution here
Yes, that’s right! We listened to the community and we’re happy to announce that in the upcoming days the limit of 25 characters will be raised to 50 characters! Time to show us some juicy titles!
Wimigames is a company developing bingo and café games. They are mainly interested on how you can influence their gambling games. Does it sounds like a program for you? Don’t hesitate and check out it out now! Note: this is a registered only program!
BHIS Webcast: Weaponizing Corporate Intel. This Time, It’s Personal! & Slides
CSIAC Webinars – OWASP Amass: Discovering Your Exposure on the Internet
Building a Small and Flexible Wireless Exfiltration Box with SDR & Demo: Wireless Exfil Box w/ SDR (Paul Clark)
Medium to advanced
Fun with Burp Suite Session Handling, Extensions, and SQLMap
Automating Red Team Homelabs: Part 2 – Build, Pentest, Destroy, and Repeat
Beginners corner
Challenge writeups
Intigriti XSS challenge solutions
Pentest writeups
Analysis-Report Chinese Police App “IJOP” 12.2018: Not exactly a pentest report, but interesting if you’re into mobile app security. Cure53 tested IJOP, an Android app used by Chinese law enforcement, to find out if it violates human rights
Responsible disclosure writeups
Why you shouldn’t do client-sided checks only; unlimited data via EE gifting system
Remote Code Execution (RCE) in CGI Servlet – Apache Tomcat on Windows – CVE-2019-0232
Synacktiv advisories regarding a bunch of pre-authenticated issues in GLPI
Bug bounty writeups
XSS & Cache poisoning on Twitter ($2,520)
XSS on Twitter ($2,940)
Local file theft/JS injection/open redirect on Twitter ($1,120)
Account takeover due to password autofill on Linode & Reddit discussion
Facebook IDOR bug in GraphQL (video)
See more writeups on The list of bug bounty writeups.
Argument Injection Hammer & Introduction: Burp extension for detecting argument injection and manipulation vulnerabilities
Docker_burp & Introduction: Burp as a Docker Container
Dirmap & Introduction: “An advanced web directory scanning tool that will be more powerful than DirBuster, Dirsearch, cansina, and Yu Jian.”
HostHunter: A recon tool for discovering hostnames using OSINT techniques
DumpTheGit: Searches through public repositories to find sensitive information uploaded to the Github repositories
pentest.sh: Installs pentesting tools, then symlinks them to be ran seamlessly
WhatBreach: OSINT tool to find breached emails and databases
PwnedOrNot: OSINT Tool to Find Passwords for Compromised Email Addresses
Coerchck: PowerShell Script For Listing Local Admins
EvilClippy: A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows
SSL Kill Switch 2: Blackbox tool to disable SSL certificate validation – including certificate pinning – within iOS and OS X Apps
What_is_this_c2: For quick visual fingerprinting of login panels
APIsecurity.io Issue 29: OAuth2 attacks, car GPS vulnerabilities, and honeypot stats
Google CTF 2019 is here: “Qualification round will take place online Sat/Sun June 22 and 23 2019”
ESI Injection Part 2: Abusing specific implementations & Edge Side Includes abused to enable RCE
How did I break a captcha with Puppeteer and Google Vision ?
Amazon S3 will no longer support path-style API requests starting September 30th, 2020: S3 will only accept paths in the form https://<bucketname>.s3.amazonaws.com/key
, not https://s3.amazonaws.com/<bucketname>/key
Remote root access on all Cisco Nexus 9000 Series devices due to a default SSH key pair: Accident or backdoor?
Hundreds of Orpak gas station systems can be easily hacked thanks to hardcoded passwords
Millions of consumer smart devices exposed by serious security flaw: A software feature called iLnkP2P, identified in at least two million devices made by several companies, is vulnerable to MiTM attacks.
More than half of popular email clients are vulnerable to signature spoofing
A hacker is wiping Git repositories and asking for a ransom: “all evidence suggests that the hacker has scanned the entire internet for Git config files, extracted credentials, and then used these logins to access and ransom accounts at Git hosting services”
Report: Unknown Data Breach Exposes 80 Million US Households
Microsoft Outlook Email Breach Targeted Cryptocurrency Users: “a hacker getting hold of a Microsoft customer support worker’s login credentials; from there, the hacker could dive into the content of any non-corporate Outlook, Hotmail, or MSN account”
Latest WebLogic vulnerability exploited for Cryptomining and DDoS Attacks & Ransomware
Hackers Steal and Ransom Financial Data Related to Some of the World’s Largest Companies: A hacker blackmailed and leaked financial data stolen from Citycomp. It’s an internet infrastructure firm that provides services to many large companies like Oracle, Volkswagen & Airbus
Hacker takes over 29 IoT botnets: “Hacker “Subby” brute-forces the backends of 29 IoT botnets that were using weak or default credentials.”
Firefox Addons Being Disabled Due to an Expired Certificate: All Firefox addons disabled because of an expired intermediary certificate used to sign Mozilla addons.
Is a sticky label the answer to the IoT’s security problems?
We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 04/26/2019 to 05/03/2019.
Curated by Pentester Land & Sponsored by IntigritiSubscribe to the newsletter here!Disclaimer:
The views and opinions expressed in this article are those of the curators and do not necessarily reflect the position of intigriti.