- Hive Five
- Posts
- 🐝 Hive Five 110 - Nuclei Foundation Series, OWASP needs to evolve, and Share the Spotlight
🐝 Hive Five 110 - Nuclei Foundation Series, OWASP needs to evolve, and Share the Spotlight
Hi friends,
I hope you had a delightful weekend. I’ve decided to learn more about Dev(Sec)Ops, so I’ve been keeping myself busy.
What have you been learning more about?
Let’s take this week by swarm!
🐝 The Bee’s Knees
Introduction to Nuclei. This is the first video in the Nuclei Foundation Series, a series dedicated to the community powered vulnerability scanner, Nuclei. more
An open letter to the OWASP directors: OWASP needs to evolve. The community asks for a response within 30 days, with a plan of action to address the five points they outline. more
Awesome Reinforcement Learning for Cyber Security. General machine learning methods applied to cyber security are not included in this list. more
Escaping misconfigured VSCode extensions is a two-part blog series that will cover how they found and disclosed three vulnerabilities in VSCode extensions and one vulnerability in VSCode itself (a security mitigation bypass assigned CVE-2022-41042 and awarded a $7,500 bounty). more
Another great post by Leif, Share the spotlight: Creating a culture where everyone shares their work. How to encourage others at your company to write blogs, appear on podcasts, and speak at conferences and meetups. more
️💪 Sponsor
Sponsor the Hive Five and reach a highly engaged community of engineers, security researchers, and ethical hackers who are at the forefront of the industry.
🔥 Buzzworthy
✅ Changelog
📅 Events
tmp.0ut Volume 3 Call For Papers. This edition is set to be released on June 23rd 2023. more
Monke asking for Ireland-based hackers to participate in the Hackerone Ambassador World Cup. more | USA
Nicolas Gregoire’s Mastering Burp Suite Pro (On Site). This training is focused on experienced Web hackers who want to master their toolbox. more
🎉 Celebrate
ScorpVayne has been nominated for and award at school on behalf of the student org @WiCySorg. Well deserved! more
ramsexy crossed 10k reputation on HackerOne. Let’s go! more
Intigriti sharing the latest Hacker Portraits: foobar0x7, renniepak, and WonderU360. Congrats! more
2022 Detectify Crowdsource Awards winners. Great job all! more
💰 Career
sk3rts is looking for student roles for anything cybersecurity related, preferably pentesting or vulnerability research. more
So you want to be a SOC Analyst? A blog series for someone wanting to get a start as a SOC Analyst. more
Developer Roadmaps is a community effort to create roadmaps, guides and other educational content to help guide the developers in picking up the path and guide their learnings. more
Security Certification Roadmap. more
⚡️ Community
Peter doesn’t understand why many fuzzing wordlists contain “logout”, “logoff” etc. right near the top. Come to think of it, I don’t either. more
STÖK feels like it’s time to get back to creating content for the community, but doesn’t know where to start. more
d0nut is 1000% sold on copilot. more
HVCK Magazine ONE:TWOZEROTWOTHREE - Wireless Edition. Featuring the people’s king of RFID: ICEMAN. more
The “U Up?” Files With Joran Honig. He’s a Security Researcher @ ConsenSys Diligence and has become one of the most feared whitehats in the space. more
📰 Read
Fortinet FortiNAC CVE-2022-39952 Deep-Dive and IOCs - PSIRT that details CVE-2022-39952, a critical vulnerability affecting its FortiNAC product. more
Let’s build a Chrome extension that steals everything. Matt sets out to prove that regardless of Manifest v3, there’s still plenty left in the tank. more
SSO Gadgets: Escalate (Self-)XSS to ATO. With the rise of Single-Sign-On (SSO) and especially OAuth 2.0 and OpenID Connect (OIDC), the attack surface of web applications has increased significantly. more
An in-depth guide to subfinder: beginner to advanced. more
An investigation into Ticket Fraud Scammers. more
📚 Resources
People’s favorite engineering blogs that publish to an rss feed. more
Paul Seekamp’s API endpoint one-liner. more
Tuan using OpenAI to help choose a target for research and hunting bugs. more
hahwul/DevSecOps is a roadmap for everyone who wants DevSecOps. more
100 Red Team Projects contains projects for security students. Red Teaming is one of the most attractive fields in offensive security or ethical hacking. more
🎥 Watch
HackTheBox Awkward walkthrough. more
Broken Access Control - Lab #5 URL-based access control can be circumvented. This website has an unauthenticated admin panel at /admin, but a front-end system has been configured to block external access to that path. more
How to setup system-wide Mullvad DNS over HTTPS on iOS and macOS. more | why
$3,133.70 XSS in golang’s net/html library, Greg’s first Google bug bounty. more
Prototype Poisoning?! - Solution to February ’23 Challenge by drleek. more
🎵 Listen
Day[0] Binary Exploitation Podcast 190 - Fuzzing cURL, Netatalk, and an Emulator Escape. This week they talk about more Rust pitfalls, and fuzzing cURL. more
Hanselminutes Podcast 879 - Why We do Tech Outreach with Coding By Sophy. Sophy is a Software Engineer who is early in career and excited to get others into tech. She was the only afro-latina to graduate from the University of California Irvine in 2019 with a degree in computer science and engineering. more
The Privacy, Security, & OSINT Show 290 - Extreme Privacy: Mobile Devices. In this episode they release their first digital guide as part of our new Extreme Privacy series, devote the bulk of the show to mobile device privacy and security, and offer some OSINT updates. more
Critical Thinking - Bug Bounty Podcast S01 E08: PostMessage Bugs, CSS Injection, and Bug Drops. They drop some critical bugs which leak raw credit card info, and discuss some CSS Injection & PostMessage related techniques. more
Malicious Life - Operation Ivy Bells. In the early 1970’s, US intelligence pointed at the possibility that the Russians have laid an underwater communication cable between two important naval bases in the Far East. more
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- • Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- • Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- • EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- • MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- • Deep DISCOUNTS on paid content.
- • Experience continuously added NEW BENEFITS.