- Hive Five
- Posts
- š Hive Five 113 - How to Hack: A Step-by-Step Journey, acropalypse, and 25 years of curl
š Hive Five 113 - How to Hack: A Step-by-Step Journey, acropalypse, and 25 years of curl
Hi friends,
Greetings from the hive!
I hope this newsletter finds you well and that you had a fantastic weekend. As for me, Iām feeling much better.
Recently, Iāve been working on a couple of projects that have sparked my creativity, and Iām thrilled to announce the launch of my latest creation - the Awesome Twitter Lists repository. This repository consists of curated Twitter lists, which is my go-to way of engaging with the platform. I hope youāll find it just as useful as I have.
Letās take this week by swarm!
š The Beeās Knees
Simon Aarons introduced acropalypse: a serious privacy vulnerability in the Google Pixelās inbuilt screenshot editing tool, Markup. Enabling partial recovery of the original, unedited image data of a cropped and/or redacted screenshot. more | demo
Disclosed report: CVE-2022-44268 - Arbitrary Remote Leak via ImageMagick. A critical bug that was rewarded $25,000. more | related
How does Bug Bounty work anyway? In this first video of a new series by InsiderPhD, in partnership with Bugcrowd, youāll learn how to go from knowing nothing about hacking to finding your first bug, to getting more consistent bounties and everything in between. more | blog post
Twenty-five years of curl. Daniel worked on curl longer than heās worked for any company. None of his kids are this old. 25 years ago he did not live in his house yet. 25 years ago Google didnāt exist and nether did Firefox. more
Use multi-repository variant analysis (beta) to run CodeQL queries at scale. CodeQL is the static code analysis engine that powers GitHub code scanning. one of its superpowers is its versatility and customizability: you can use it to find virtually any pattern in source code. more | docs | discussion
ļøšŖ Sponsor
Sponsor the Hive Five and reach a highly engaged community of engineers, security researchers, and ethical hackers who are at the forefront of the industry.
š„ Buzzworthy
ā Changelog
Feroxbuster v2.9.2 release. Link extraction is on by default, fixed a few bugs, and added a cool QoL feature. more
xnLinkFinder v3.9 release. Pass a Cairo export CSV file as input and more. more
Caido v0.24.0 brings several exciting new features, including support for Unicode characters in the editor and request/response exporting. more
Sans launched Cybersecurity Career Affordably where they adopt an Income Share Agreement (ISA). They want to make their undergraduate programs as accessible to students who demonstrate high potential to succeed. more
OpenAI released GPT-4, a large multimodal model, with their best-ever results on capabilities and alignment. more | technical paper
š Events
š Celebrate
š° Career
Your Job Doesnāt Matter (and Thatās Great News). Jason very much believe that none of this stuff matters. Our jobs, the work, all of it. Itās completely meaningless. more
Rosie on community: āIs community the only part of the business that has the expectations of becoming self-sustaining? ā¦ā more
ā”ļø Community
d0nut spilled soda on his das keyboard (.. again) and then broke it while trying to clean it (.. again) BUT discovered newfound love for another keeb. more
Inti was offered a $25 bounty and a reminder to stick to the scope from a massive corporation for informing them that all their corporate credentials and API keys are exposed in a PUBLIC repo. more
bxmbn will be disclosing two reports soon. more
Ankit had a wonderful experience delivering a two days workshop on āEthical Hacking & Cyber Securityā at āHackers Horizonā event by VIT, Chennai. more
Ben stopped making content he thought people wanted to see and started making content he enjoys making. more
š° Read
Finding Hundreds of SSRF Vulnerabilities on AWS. During Trickestās latest research project, which involved uncovering IP addresses hidden behind proxies like Cloudflare they stumbled upon numerous IPs susceptible to SSRF via the Host header. more
EJS - Server Side Prototype Pollution gadgets to RCE. In February 2023, KĆ©vin took a look into NodeJS HTML templating libraries. During their research, they found an interesting Server Side Prototype Pollution (SSPP) gadget in the EJS library which can be leveraged to RCE. more
How Your NFTs Could Have Been Stolen in Just One Click. more
Reconnaissance 103: Host and Port Discovery. After gathering all available subdomains, the following process filters all valid ones based on their HTTP method and response content. more
The Time Tom Hacked Googleās Manual Actions Database. In 2013, Google released a tool to view the manual actions (penalties) they were applying to your own site. more
š Resources
John interviews the people behind the Free Hacking APIs Course (APISEC University). more | course
ignis-sec/Pwdb-Public is a collection of all the data i could extract from 1 billion leaked credentials from internet. more
Google/kCTF is a Kubernetes-based infrastructure for CTF competitions. more
cJoelGMSec/MyTalks is a talks collection of slides on cybersecurity and ethical hacking by Joel GƔmez Molina. more
Hack-with-Github/Awesome-Hacking is an awesome hacking collection of awesome lists for hackers, pentesters, and security researchers. more
š„ Watch
HackTheBox - Extension walkthrough. more
Broken Access Control - Lab #8 UID controlled by parameter, with unpredictable UIDs. This lab has a horizontal privilege escalation vulnerability on the user account page, but identifies users with GUIDs. more
DNS Remote Code Execution: Finding the Vulnerability (Part 1). more
How John found your GitHub secrets. more
Does Cybersecurity Require Programming? One of the most common questions he asks his guests on the Live Recon stream is whether or not coding is required for hacking and cybersecurity. more
šµ Listen
Smashing Security 313 - Tesla twins and deepfake dramas. The twisted tale of the two Teslas, and a deepfake sandwich. more
Day[0] Bug Bounty Podcast 195 - Stealing Secrets with Security Advisories and CorePlague. A few varied issues this week, exploiting an apparently unexploitable CRLF injection, organization secrets exposure in GitHub, and a Jenkins XSS. more
Fossified - Daniel, Henrik, Magnus and Johan discuss all things free and open source. In this episode theyāre talking about Curl and the fact that the project turns 25 years old. more
Critical Thinking S01 E11 - Episode 11: CVSS, Web Cache Deception, and SSTI. more
Adventures in DevOps 154 - Whatās the Tea With Max Howell. Max Howell is the creator of Homebrew and is the CEO of Tea. He joins the show alongside Jonathan and Will to talk about Tea, the next-generation, cross-platform package manager. more
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- ā¢ Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- ā¢ Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- ā¢ EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- ā¢ MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- ā¢ Deep DISCOUNTS on paid content.
- ā¢ Experience continuously added NEW BENEFITS.