- Hive Five
- Posts
- š Hive Five 114 - How to Lose a Pentester in 10 days, Badsecrets, and Account Takeover in OpenAI
š Hive Five 114 - How to Lose a Pentester in 10 days, Badsecrets, and Account Takeover in OpenAI
Hi friends,
Greetings from the hive!
I hope you had a good weekend. I rode my bike for the first time in a long while, and it was wonderful.
Tech-wise, I cleaned up my neovim config and replaced packer with Lazy. I tried some different color schemes as well but always come back to the tried and true gruvbox.
I hope to open source all of my dotfiles soon on my GitHub account.
What were you up to this weekend?
Letās take this week by swarm!
š The Beeās Knees
Beloved hacking veteran Kelly āAloriaā Lum passes away at 41. Aloria will be remembered for her hacking acumen, memorable memes and unparalleled karaoke skills. more
Linus Tech Tips was hacked. He shares how his channel(s) and videos were deleted, what happened, and prevention measures. more
NahamCon2022EU: Managing a Bug Bounty Program From a Hackerās Perspective by 0xlupin. more
How to Lose a Pentester in 10 days. Ippsec talks about the importance of thinking outside of the box, build blue team motivation, and help shape the attacker mindset. more
Black Lantern Security introduced Badsecrets. A library for detecting known or weak secrets across many web frameworks. more | tool
ļøšŖ Sponsor
Sponsor the Hive Five and reach a highly engaged community of engineers, security researchers, and ethical hackers who are at the forefront of the industry.
š„ Buzzworthy
ā Changelog
Oege de Moor quit GitHub. He led the creation of GitHub Copilot and GitHub Advanced Security (previously Semmle). more
Jason Haddix started a newsletter! Sign up for āExecutive Offenseā a newsletter at the center of offensive security and security strategy. For technical leaders in cyber security. more | subscribe
xnLinkFinder v3.10 is available: Find even more parameters in responses. more
The author of GitLeaks, Zach Rice, joined Truffle Security. more
For the last two months the assetnote wordlists had not been updated due to a missing JS library used by bigquery. This has now been fixed. more
š Events
Jason Haddix added a second run and weekend to his live course. more | registration
Join Bellingcatās April 2023 Hackathon and increase the accessibility of Open Source Tools. Bellingcat will host a remote global hackathon for teams of up to three people to increase the accessibility of software tools used in digital investigations between 21 and 23 April. more
Defcon615 speaker for March 28th at 6:30pm CST will be none other than Jayson Street. more | discord
š Celebrate
š° Career
ā”ļø Community
Max Yaremchuk sent their most extensive report up to date. Itās 9k chars long and contains 15 reproduction steps. more
Ananda et al held their first-ever live hacking meetup where they hacked on the HackerOne Ambassador World Cup targets all day and found some cool bugs. more
lil c is learning video editing by putting out some videos to sharpen her skills. more | YouTube
Katie has been sick for a week with multiple infections and itās been so frustrating to not be able to do anything, Please send her healing vibes. more
Bug bounty hunters discussing the desire to disclose findings. more
š° Read
Nagli found a critical account takeover vulnerability in OpenAI. The vulnerability was āWeb Cache Deceptionā. more
Mustafa and Osirys discovered an interesting case of SQL injection on the Synack Red Team target which was black box testing. more
Exploiting aCropalypse: Recovering Truncated PNGs. (I forgot to include this blog post last week when I first mentioned aCropalypse.) more
4 more essential tips for using the Wayback Machine. more
How different hacker roles contribute to crowdsourced security. Codingo canāt say this too often: Adopters of crowdsourced security are only as successful as the hackers/security researchers with whom they collaborate, whether itās in a crowdsourced penetration test, bug bounty, or something else. more
š Resources
Keyboard suggestions via Jason Haddix. Donāt believe it was mentioned, but Iām eyeing the glove80 keyboard. more | glove80
The MySQL for Developers course is live. A free, 7 hours long course, thatās split into 64 videos! more
Client-side path traversal vulnerability class explained - $6,580 GitLab bug bounty. more
Learn how to dockerize a Node.js Application. Key take-aways include using multi-stage builds, running your container as a non-root user, and pushing your image to Docker Hub. more
awesome-selfhosted/awesome-selfhosted is a list of free software network services and web applications which can be hosted on your own servers. more
š„ Watch
Avoiding false positive reports in bug bounty. more
HackTheBox - Vessel walkthrough. more
Broken Access Control - Lab #9 UID controlled by param with data leakage in redirect. more
Choosing how YOU hack! Fitting in to bug bounty. g0lden talks about why finding your own methodology and area to hack in can increase your success and enjoyment. more
Hacker Interviews with TJ_Null. more
šµ Listen
Prolific creator devaslife shares the music behind his coding tutorials. more
Binary Exploitation Podcast 198 - TOCTOUs in Intel SMM and Shannon Baseband Bugs. Theyāve got a pretty nice root/super-use check bypass in XNU this week, and a sort of double fetch issue in Intelās SMM leading to a potential privilege escalation into the Management system. more
Bug Bounty Podcast 197 - Popping Azure Web Services and Apollo Config Bugs. Recovering data from a cropped image (thanks to an undocumented API change, bypassing an origin check with an emoji, and a trivial SSRF filter bypass all in this weekās bug bounty podcast. more
The Privacy, Security, & OSINT Show 292 - Vital News & Updates. This week they provide several important updates including Android vulnerabilities, Mint Mobile acquisition, BreachForums disappearance, and many new OSINT tools. more
Critical Thinking - Bug Bounty Podcast episode 12: JHaddix on Hacker -> Hacker CISO, OG Hacking Techniques, and Crazy Reports. more
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- ā¢ Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- ā¢ Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- ā¢ EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- ā¢ MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- ā¢ Deep DISCOUNTS on paid content.
- ā¢ Experience continuously added NEW BENEFITS.