- Hive Five
- Posts
- 🐝 Hive Five 127 - Authentication vulnerabilities, Hacking Google Cloud, and Wordlists
🐝 Hive Five 127 - Authentication vulnerabilities, Hacking Google Cloud, and Wordlists
Hi friends,
Greetings from the hive!
It’s getting hot in herre. I’m writing this newsletter while sitting outside, watching kids play around in a water pool.
Earlier today, I went to the gym for the first time in a while.
Here’s to a wonderful summer.
Let’s take this week by swarm!
🐝 The Bee’s Knees
Authentication Vulnerabilities - Complete Guide. In this video, they cover the theory behind authentication vulnerabilities, how to find these types of vulnerabilities, how to exploit them and how to prevent them. more
Hacking Google Cloud? Every year Google celebrates the best security issues found in Google Cloud. This year LiveOverflow takes a look at the 7 winners to see if we could have found these issues too. more
Microsoft has revamped their security documentation site. Technical guidance that helps security professionals build and implement cybersecurity strategy, architecture, and prioritized roadmaps more
BishopFox/jsluice, written by TomNomNom, is a Go package and command-line tool for extracting URLs, paths, secrets, and other interesting data from JavaScript source code. Fun fact, it’s named after a “sluice box” a thing you use to find gold. more
Bug Bounty: Wordlists. You are only so good as your weakest link. And in bug bounty, most people’s weakest link, and most ignored is always their wordlists. more
️💪 Sponsor
Sponsor the Hive Five and reach a highly engaged community of engineers, security researchers, and ethical hackers who are at the forefront of the industry.
🔥 Buzzworthy
✅ Changelog
📅 Events
🎉 Celebrate
Sam is super impressed by 17-18 year olds that are participating at Live Hacking Events. Love to see it! more
Damian is cofounding a Legal Tech Startup. Exciting! more
“The Bug Musketeers” earned a 40k bounty at Intigriti’s 1337UP0623. Let’s go! more
The Critical Thinking podcast recorded a sick pod with 2x MVH Inhibitor. Can’t wait to listen! more
Ali finished 4th overall in his first HackerOne Live Hacking Even in London. Amazing! more
💰 Career
Google is hiring Senior Researcher in the Netherlands, Mandiant, Google Cloud. more
Roles for pentesters that are looking to transition. more
Sherrod shares actionable tips for those that want to work in cyber threat intelligence. more
The most important piece of career advice you probably never heard: “Fix the lifestyle you want. Then work backwards from there.” more
Farah Hawa shares some learnings from her recent job hunting process, right from applying and interviewing to accepting an offer. more
⚡️ Community
Hackers bot finally had its Twitter API key banned on June 22nd. The last tweet said: “As hackers taught us, capitalism corrupts all beautiful tings, and queer will always end victorious. […]” more
Caitlin got a beeautiful tattoo during HackerOne’s Live Hacking Event in London. more
Dave got a new tattoo with a great story behind it. more
Cyber Kitten is ready for Hacker Summer Camp. more
Katie came full circle, back to where she started. more
📰 Read
Piotr shares a next level phishing scam involving Discord. more
Another bug bounty story by Soroush, taking on the challenge of bypassing a Web Application Firewall (WAF) for XML External Entity (XXE) injection. more
Scan to scam: how thieves can steal credits at cashless music festivals. Convenience is king, especially at music festivals where every extra minute spent in line can prolong the queue with hours. more
AWS WAF Clients Left Vulnerable to SQL Injection Due to Unorthodox MSSQL Design Choice. While doing research on Microsoft SQL (MSSQL) Server, a GoSecure ethical hacker found an unorthodox design choice that ultimately led to a web application firewall (WAF) bypass. more
A white paper on Emotional Intelligence. Harnessing OSINT methods to uncover the emotions and moods of individuals. more
📚 Resources
A collection of concise write-ups on small things Josh learned day to day across a variety of languages and technologies. more
mindedsecurity/semgrep-rules-android-security is a compilation of Semgrep rules derived from the OWASP Mobile Application Security Testing Guide (MASTG) specifically for Android applications. more
CVExploits is a database of exploits for all of the old & new common exposures and weaknesses (CVEs) by collecting the exploits automatically from around the internet websites & projects such as (github, gitlab, packet storms ecurity, metasploit modules and many more). more
Destroyed by Breach. Adrian created and started maintaining this research after coming across a fake stat many years ago, that “60% of small businesses will close up within six months of a cyber attack”. more
🎥 Watch
In this 4th video in the series customizing Parrot with ansible, ippsec configures Iptables/UFW and Auditd. more
Ippsec walks through HackTheBox - Stocker. more
Intruder Alert Ep. 3 - Hacktivism and Bug Bounties with Nahamsec. more
Casey delivers “Release the Hounds, Part 2 - 11 Years Is A Long-Ass Time” as the keynote for BSides Knoxville on May 12th, 2023. This talk covers the history of vulnerability disclosure and crowdsourced security testing platforms, and dives into cybersecurity entrepreneurship. more
The video stresses that there is no one specific path or set of requirements for becoming an ethical hacker or entering the cybersecurity industry, and it is important to avoid the harmful mentality of gatekeeping. more
🎵 Listen
We Hack Purple Podcast 78 with Jason Haddix. They talk about artificial intelligence, and (of course) how to hack it. more
The Privacy, Security, & OSINT Show 301 - Self-Hosted 3: Calendars, Contacts, & Notes. more
Smashing Security 327: Mark’s metaverse for minors, and getting down to business. more
Critical Thinking - Bug Bounty Podcast Episode 24: AI + Hacking with Daniel Miessler and Rez0. more
Petaflops to the People: from Personal Compute Cluster to Person of Compute with George Hotz of tinycorp. They talk about how tinygrad is taking on Nvidia, Google, and PyTorch with a tiny team, building in public with AMD, hot takes on ggml, Mojo, and GPT-4, and why AI Girlfriend is next. more
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- • Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- • Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- • EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- • MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- • Deep DISCOUNTS on paid content.
- • Experience continuously added NEW BENEFITS.