- Hive Five
- Posts
- 🐝 Hive Five 105 – Mastering Broken Access Control and An Ethical Hacker's Guide
🐝 Hive Five 105 – Mastering Broken Access Control and An Ethical Hacker's Guide
Hi friends,
Greetings from the hive!
I hope all is well. I’ve been running every day for a couple of weeks now and it’s amazing. I stopped for a month, for various reasons, and didn’t realize how much I missed it.
There’s nothing quite like the solitude and runner’s high. The ideas that come to me during a run are also unmatched. I’d recommend it to anyone.
If you’re not a runner, a walk or hike should have a similar effect. Let me know when you get one in! I’d love to hear how it went.
Let’s take this week by swarm!
🐝 The Bee’s Knees
Live Recon: Interviewing A Hacker - Shashank (cyberboyindia). He’s the co-founder credshields, ex-security analyst at HackerOne, and a team lead at Cobalt. more | twitter
LevelUpX - Series 14: Finding and Exploiting Hidden Functionality in Windows DLLs with Nerdwell. In this presentation, Nerdwell dives deep into Windows DLL hacking and reviews common bug patterns that he’s found in the wild. more
Broken Access Control complete guide. This video covers the theory behind Access Control vulnerabilities, how to find these types of vulnerabilities from both a white box and black box perspective, how to exploit them and how to prevent them. more
How to Be An Ethical Hacker: 2023 Edition. more
A growing list of root cause analysis of DeFi Hacks. more
️💪 Sponsor
Reach a highly engaged community of engineers, security researchers, and ethical hackers who are at the forefront of the industry. Sponsor the Hive Five
🔥 Buzzworthy
✅ Changelog
📅 Events
The BSidesCharm 2023 Call for Volunteers is officially open. more
Trace Labs tickets for Global OSINT Search Party will be on sale Jan 28th on Eventbrite. more
Do you enjoy reading and learning? README is a new software developer book club. First meeting on Friday Jan 27. more
Caido is now in public beta. They have been working on Caido since 2021 and are proud to share with you what they have built. more
🎉 Celebrate
Kaitlyn’s first ever shmoocon talk went great. Love to see it! more
HackerOne’s H1407 Epic Games winners. Congrats all! more
Jack Cable joined CISA this week as a Senior Technical Advisor. Awesome! more
Azeria finished their book and it’s in production. Woohoo! more
Shrirang Kahale turned 16. Congrats! more
💰 Career
chompie on the grim Google layoffs. more
Steph’s lay-off tips for both those affected and those who aren’t. more
Security and Privacy Activist - The Electronic Frontier Foundation (EFF), an established nonprofit organization defending online privacy and free expression, is looking for a full-time writer and advocate to join our Activism team. more
Companies that are hiring in tech right now, and what they’re hiring for. more
Nico reminding us that they hold public office hours to anyone that wants to talk about their career, mentorship, cybersecurity in general or just want to chat. more
⚡️ Community
Hacker AFK: InsiderPhD - an interview series by HackerOne. more
Good people at Shmoocon. more
STÖK is not the best version of himself right now. Sending good vibes! more
zseano asks: “why do those who run bug bounty platform twitter accounts not shill bug bounty programs on their platform that we should look at ?” more
📰 Read
The main things to do—and avoid doing—when contacting and working with a mentor. more | related video
Bad things come in large packages: .pkg signature verification bypass on macOS. Code signing of applications is an essential element of macOS security. Besides signing applications, it is also possible to sign installer packages (.pkg files). more
SSH key injection in Google Cloud Compute Engine (Google VRP). This write-up is the first in a series of write-ups about bugs that they, and Sreeram, found in Google Cloud during 2022. After hunting for bugs continuously in common Google apps such as Drive, they wanted to venture into Google Cloud. more
Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP”. September’s Patch Tuesday unveiled a critical remote vulnerability in tcpip.sys, CVE-2022-34718. more
Learn to build it, then break it. The philosophy is simple: learn security by building projects, reading official documentation and codebases, and then attempting to find security flaws in your work. more
📚 Resources
Offensive Research Guide to Help Defense Improve Detection. more
Free AWS Cloud Practitioner Exam (CLF-C01) resources. more
shieldfy/API-Security-Checklist is a checklist of the most important security countermeasures when designing, testing, and releasing your API. more
Java-Deserialization-Cheat-Sheet is a cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries. more
🎥 Watch
🎵 Listen
Critical Thinking S01 E02 - In this episode of Critical Thinking they talk about exploit writing/automation, some new tools released in the industry (Of-CORS), the age old question of “Do you have to know how to program to hack?”, a walk-through of some very impactful bug bounty reports, and some. more
Binary Exploitation Podcast 180 - An iPod Nano Bug, XNU Vuln, and a WebKit UAF. An Apple-focused episode this week, with a trivial iPod Nano BootRom exploit, and a WebKit Use-after-free. more
Smashing Security 305: Norton unlocked, and police leaks. Carole is in her sick bed, which leaves Graham in charge of the good ship “Smashing Security” as it navigates the choppy seas of credential stuffing and avoids the swirling waters of apps being sloppy with sensitive information. more
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- • Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- • Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- • EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- • MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- • Deep DISCOUNTS on paid content.
- • Experience continuously added NEW BENEFITS.