- Hive Five
- Posts
- š Hive Five 109 ā Find Linux Kernel bugs and Escape, How to Bug Bounty in 2023, Server-side prototype pollution
š Hive Five 109 ā Find Linux Kernel bugs and Escape, How to Bug Bounty in 2023, Server-side prototype pollution
Hi friends,
Greetings from the hive!
I hope you had a good weekend. I came across this tweet by Morten where he expresses what Iāve been wanting to see: a browser that features tabs vertically next to each other. Preferably serving the mobile versions to make maximum use of the space and reduce clutter.
In the replies, I saw many people mention Arc browser, so Iāll give that a go!
In general, I love this tiling approach, and I use it whenever I can. Some examples are TweetDeck, tmux, vim, and a tiling window manager.
What do you think is missing in tech? What would you like to see?
Letās take this week by swarm!
š The Beeās Knees
Top 10 Web Hacking Techniques of 2022, the 16th edition of the annual community-powered effort to identify the most important and innovative web security research published in the last year. more
Recon2022: Breaking the Glass Sandbox - Find Linux Kernel Bugs and Escape. chompieās Recon2022 talk. more | slides
VPNs, Proxies and Secure Tunnels Explained (Deepdive). What is a secure ātunnelā? more
How to Bug Bounty in 2023 by NahamSec. more
Server-side prototype pollution: Black-box detection without the DoS. Server-side prototype pollution is hard to detect black-box without causing a DoS. In this post, they introduce a range of safe detection techniques, which theyāve also implemented in an open source Burp Suite extension. more | Burp extension
ļøšŖ Sponsor
Sponsor the Hive Five and reach a highly engaged community of engineers, security researchers, and ethical hackers who are at the forefront of the industry.
š„ Buzzworthy
ā Changelog
CoLab is a new section in CTF challenge. It features labs from courses by industry experts. The first two are nahamsec-training and NahamStore from NahamSecās Udemy course. more
Six2dez - reconFTW v2.5.2 codename āconference seasonā is out. Highlights: byp4xx for 4xx bypasses @lobuhisec, waymore replaces gau and waybackurls @xnl_h4ck3r, added gitlab-subdomains @gwendallecoguic, and included ffuf new hashmap feature @joohoi. more
Flamingo v0.0.20 captures credentials sprayed across the network by various IT and security products. more
osmedeus v4.3.1 is a workflow engine for offensive security. more
š Events
š Celebrate
zseano is having his 2nd baby in May and is planning to go AFK in April, returning sometime later in the year. Congrats! more
Greg turned 25. Happy birthday! more
Osirys is back (mentally and physically) after over 1.5 months of āforced breakā. Welcome back! more
Ankit Singh received his Bugcrowd swag for a live hacking event, securing 2nd place and earning over $30,120 in bounties. more
Pibble ordered a custom made āHack the Planetā sign for her manās office and it turned into a whole office makeover. Looks amazing! more
š° Career
Roadmap to your first cyber job. $60-90k/year starting salary for an entry level cyber position can be yours in the next 6 months with hard work, and most importantly, the right kind of work. more
Angie Jones on being careful with that āI:Weā ratio when stating your accomplishments. more
nemesisās boyfriend is actively looking for senior red team/offensive security engineer roles. Remote/CA area. more
Vic on being affected by a layoff: āknow that itās NOT YOUR FAULT. Your personal worth is not in question. Take care of yourself & go back out there. There is no shame in this.ā more
Ian Coldwater is open for anything interesting for their skill set, their DMs are open. more
ā”ļø Community
d0nut felt like he wasnāt good at anything in particular. more
Masonhck357 wants to do better at communication and keeping in touch with the community this year. more
pry0cc on GitHub copilot being a 10x multiplier. more
Cam from Darknet Diaries episode 85 āCam the Carderā has passed away. Jack mentions that he was a valuable resource to the show and a friend. more
Smelly is taking an hiatus from vx-underground due to health issues. more
š° Read
cURL audit: How a joke led to significant findings. In fall 2022, Trail of Bits audited cURL, a widely-used command-line utility that transfers data between a server and supports various protocols. more
Are you a bug bounty hunter curious about how works on the other side? more
What single command people would run if they had a reverse shell/RCE. more
Bypassing Okta MFA Credential Provider for Windows (POST exploitation technique). more
Exploiting Out Of Band XXE using internal network and php wrappers. more
š Resources
(Not So) Smart Contracts - This repository contains examples of common Ethereum smart contract vulnerabilities, including code from real smart contracts. more
VAmPI is a vulnerable API made with Flask and it includes vulnerabilities from the OWASP top 10 vulnerabilities for APIs. more
edoardottt/missing-cve-nuclei-templates contains a daily updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration tests and vulnerability assessments too. more
IAM Vulnerable lets you use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground. more
Using a Project Discoveryās katana to migrate a website. more
š„ Watch
Deep Dive into Parsing SSH Keys To Exploit Improperly Sanitized Screenshots. more
HackTheBox - RainyDay walkthrough. more
Broken Access Control - Lab #4 User role can be modified in user profile. more
Introduction to the Intelligence Cycle. A look at arguably the primary pillar of cyber threat intelligence and how it all works. more
Networking for Pentesters: Beginner. In this Black Hills Information Security (BHIS) series, Serena will be going over networking basics and how they relate to Pentesting. part 1 | part 2 | Part 3
šµ Listen
Daniel Miesslerās new go-to hacking playlist. more
Day[0] Binary Exploitation Podcast 188 - Rusty Kernel Bugs, mast1c0re, and OpenSSH. Few discussions this week, from using ASAN for effectively, to vulnerabilities in Rust code, and some discussion about exploiting the OpenSSH double free. more
Day[0] Bug Bounty Podcast 187 - Top 2022 Web Hacking Techniques and a Binance Bug. They talk about the Top Web-hacking techniques of 2022, and some TruffleSec/XSS Hunter drama before so we cover a blockchain verification bug, and a simple path traversal to SSTI and RCE chain. more
Risky Biz Soap Box: Greynoise has built the worldās biggest, and smartest, honeypot. In this interview theyāre chatting with the founder of Greynoise Intelligence, Andrew Morris. Greynoise operates a global network of sensors that collect data on things like mass scanning, exploitation and reconnaissance. more
Critical Thinking - Bug Bounty Podcast S01 E07: PortSwigger Top 10, TruffleSecurity Drama, and more. In this episode they talk about PortSwiggerās Top 10 Web Hacking Techniques of 2022, some drama surrounding TruffleSecurityās XSS Hunter, and, as always, some great bug bounty tips. more
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- ā¢ Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- ā¢ Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- ā¢ EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- ā¢ MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- ā¢ Deep DISCOUNTS on paid content.
- ā¢ Experience continuously added NEW BENEFITS.