- Hive Five
- Posts
- π Hive Five 166 - Mastery: Languages, Burp Suite, and APIs
π Hive Five 166 - Mastery: Languages, Burp Suite, and APIs
Node.js documentary, hunting down bullsh*t, IDORs and more...
Hi friends,
Greetings from the hive!
Last week, I created my first extension for Raycast, my go-to desktop launcher. This extension allows you to quickly search and query public bug bounty programs and Vulnerability Disclosure Programs (VDPs), streamlining the process of identifying potential targets.
Developing this extension was a blast, and I can't wait to share it with the community. In the coming days, I'll be publishing the extension on the Raycast store, making it easily accessible to all users. Additionally, I'll be writing a blog post detailing the development process, the features, and how to leverage it.
Started working on a @raycastapp extension to quickly lookup public bug bounty programs
Data pulled from @pdiscoveryio's Chaos
β Thrive with the Hive π (@securibee)
1:57 AM β’ Mar 20, 2024
Let's take this week by swarm!
π The Bee's Knees
Learn By Building: Language Server Protocol. In this video, TJ builds an entire Language Server from an empty Go project with literally no dependencies. YOUTUBE
Unsaflok is a series of serious security vulnerabilities in dormakabaβs Saflok electronic RFID locks, commonly used in hotels and multi-family housing environments. Over three million hotel locks in 131 countries are affected. UNSAFLOK
Node.js: The Documentary. Back in 2008, most people thought of JavaScript as just a client-side language. But when Google's V8 appeared, young developer Ryan Dahl made the connection between non-blocking servers, V8, and JavaScript. It was by combining these key elements that he was able to create the now hugely popular Node.js. YOUTUBE
NahamSec's 2024 API Hacking Guide, including leveraging application access, analyzing JavaScript files, brute-forcing, and exploiting documentation. YOUTUBE | 5 Week Program
Nicholas (Agarri) gave a follow-up talk to his original of 2013: Burp Suite Pro tips and tricks, the sequel. Based on his in-depth knowledge of both Burp Suite and its extensions, this talk aims to provide bug hunters and pentesters with a set of useful strategies. The underlying goal is to increase the efficiency of the testing workflow (in terms of both capabilities and speed). YOUTUBE
οΈπͺ Sponsor
Hive Five is the go-to resource for industry professionals, decision-makers, and builders/creators in the security and technology space, providing them with the tools they need to 10x their job to be done.
π― Last week on the Hive
π₯ Buzzworthy
β Changelog
Caido v0.34.0 introduced "Findings": Flag interesting requests and make your own passive scanner rules. TWITTER
Hacker Hideout updated their website. TWITTER
Obsidian 1.5.11 release with lots of overdue fixes and performance improvents for mobile and more. TWITTER
LazyGit v0.41.0 release is a big one, including a whopping 595 commits from a period of over 7 months, from 40 different contributors. GITHUB
DOMPurify v3.0.11 release fixes a conditional bypass caused by Processing Instructions and the regex for HTML Custom Element detection. GITHUB
π News
AI builders and researchers say that Anthropic surpassed OpenAI in performance. TWITTER
Valve announces Steam Families. When you join a Steam Family, you automatically gain access to the shareable games that your family members own and they will also be able to access the shareable titles in your library. STEAM
New HackerOne platform standards coming April 2nd: IDORs with unpredictable IDs, System Issues, Leaked Credentials, and Bypassing resolved reports. TWITTER
π Celebrate
Nagli turned 26 years old. Happy birthday! TWITTER
Alex received some amazing feedback from the Bugcrowd team this month. Well deserved! TWITTER
Chompie nailed her first Pwn2Own event and walks away with $15,000 and 3 Master of Pwn points. LFG! TWITTER
Renniepak was awarded a $7,500 bounty on HackerOne (for an HTML injection?). Congrats! TWITTER
Trash Puppy is starting as a Threat & Attack Simulation intern in May. Yay! TWITTER
π° Career
ChatGPT for Job Seekers: Best (and Worst) Use Cases. Jeff shows you how to streamline your job search. YOUTUBE
Aaron got laid off a few weeks ago and created an epic video on what he's doing next. TWITTER
Questions Pentesters should ask their prospective employers. TWITTER
A recruiter response template by Jay. TWITTER
Tib3rius is looking for a remote, US-based, webapp-focused pentesting position. He has over 12 years experience in the industry, plus the ability to effectively communicate with customers in different roles, develop testing tools on the fly, and spread brand awareness on social media / at conferences. TWITTER
β‘οΈ Community
How close will your hotel be to DEF CON? Deviant lists out which hotels are in walking distance to at least one of the entrances to the Las Vegas Convention Center's West Hall. YOUTUBE
Godfather Orwa started an AMA of sorts to share knowledge with the community. TWITTER
Meet the hacker: HG_Real. He focuses on game hacking, which he considered his dream job: playing games, searching for security vulnerabilities, and getting paid for it. INTIGRITI
Corben switched email clients from Superhuman to Shortwave. He says it has a cleaner UI, more AI functionality, and is cheaper. TWITTER
If you DM Jason a good recon technique he wasn't already aware of, he'll give you a free seat to his class and cite you in his course. TWITTER
π° Read
Two different IDOR bugs at VvAA[.]nl - What if a ransomware group could exactly see which healthcare provider is insured against ransomware attacks; insurance policies that include a guaranteed payout of paid ransoms? MEDIUM
JSON Smuggling: A far-fetched intrusion detection evasion technique. Insignificant whitespaces in the JSON standard can be used to encode data without breaking the format. This could aid malicious actors in covert lateral movement or data exfiltration. MEDIUM
Misconfigured API endpoint on portal.skge.nl leaks PII data of registered healthcare providers. MEDIUM
Javascript deobfuscation the easy way. The de-obfuscation process can be long and arduous, so the XSSDoctor set out to make it a little easier by writing a script. MEDIUM
CVE-2024-25153: Remote Code Execution in Fortra FileCatalyst - CVE-2024-25153, a critical Unsafe File Upload and Directory Traversal vulnerability in Fortra FileCatalyst, allows a remote unauthenticated attacker to gain Remote Code Execution (RCE) on the web server. This affects Fortra FileCatalyst Workflow 5.x, before 5.1.6 Build 114. NETTITUDE
π‘ Tips
Paul shares his favorite IDOR tip when running into UUIDs. TWITTER
Mason on being no different from most beginners 3 years ago. He says that consistency is key. TWITTER
Ippsec's favorite book of the year so far: 100 Go Mistakes and How to Avoid Them. "Knowing what didn't work is more valuable as that's where the time is spent fixing things.", he says. TWITTER
Nathaniel on keeping it simple, especially for web testing: "[...] you need to get down the basics..." TWITTER
How m4ll0k turned 2 out-of-scope XSS into a big XSS win, earning a $70k bounty. TWITTER
π― Follow
Awesome accounts to follow. Randomly selected from my curated Twitter lists.
@alxbrsn | Alex Birsan.
@0xdabbad00 | Scott Piper | Cloud security historian. Developer, CloudMapper, and Parliament. Founding team for fwdcloudsec.
@PascalSec | Ξ‘ΞSCΞLSΞC | Hybrid Pentest Manager Intigriti Hacking Content Creator at Hacksplained.
@hakluke | hakluke | Bug hunter, pentester. My mission is to improve the marketing of the cybersecurity industry. Founder of: haksecio, hacker_content.
@NahamSec | Ben Sadeghipour | Attack surface management & bug bounty. NahamCon organizer, hacker, speaker & content creator. Ex HackerOne
π Productivity
Get laser focused for 2024 (in 18 minutes). 5 steps to crush your goals. YOUTU
How Danny Writes in Obsidian. He covers Settings and Community plugins, such as Dataview queries, Quick Add, and Metadata Menu. YOUTUBE
What is your favorite keybinding you've discovered so far this year? Mine's SHIFT + j for Vim - J joins the line the cursor is on with the line below. TWITTER
DuckDB as the New jq. PGRS
Mastering Cyber Threat Intelligence with Obsidian. It enables analysts to use private datasets for live correlations, statistics, graph visualizations, and tailored workflows leveraging templates, tags, and community plugins. MEDIUM
π Shaan's storytelling and frameworks are next-level. This time it's no different:
Define your Yes Threshold
Manager schedule vs. Maker schedule
The Pyramid of Clarity
Floor goals and Fuck Yeah Goals
Write it out. Be specific
Input vs. Output
Putting it all together
Get $200 to try DigitalOcean. Level up your bug bounty game with the ultimate VPS solution. It's my go-to for all recon, automation, and even VPN needs. Get access to a comprehensive range of cloud resources, all at an affordable price.
π Technology
The 1st Cyber-security Domain-Specific Language: Efficient, Function-level Invocation, Auto-completion, and Advanced Tools. YAKLANG
Neuralink recently demonstrated the results of a brainchip installed in their first human patient. Learn how the Neuralink N1 is installed and how it reads brainwaves to perform actions entirely from thoughts. YOUTUBE
Psychiatrist and author Peter Kramer discusses his background in psychiatry and psychotherapy. He also talks about how technology, such as ChatGPT, is changing the way we perceive and treat mental health issues, leading to new understandings and categorizations of mental health disorders. YOUTUBE
AI Prompt Engineering Is Dead. Long live AI prompt engineering. New research suggests that prompt engineering is best done by the model itself, and not by a human engineer. IEEE
SigNoz monitors your applications and troubleshoot problems in your deployed applications, an open-source alternative to DataDog, New Relic, etc. GITHUB
π§ Wisdom
The importance of picking a fight you'll never win. Anything Casey Neistat releases I watch. This time he talks about cinema movies being released straight to Amazon Prime. YOUTUBE
Cold Wisdom 75: How the Power Down Ritual Saved Sahil's Work-Life Balance. YOUTUBE
Alex on feeling like you never get enough work done. They say it's common with so many high achieving people in security. TWITTER
Shaan on the two types of mistakes in a company: error of action and error of inaction. The latter being the dangerous ones. TWITTER
Nathaniel on lessons in humility from bug bounty hunters. He brings up instances where people show him critical vulnerabilities in apps he's already tested. TWITTER
π Another brilliant format by Sahil. Every morning, he takes a cold plunge and shares wisdom. I don't know how he does it AND stays coherent, but something to strive for for sure.
π Cross-pollination
Scott Kelby on using your iPhone as your second camera for travel. He will change how you, as a photographer, think of your iPhone's camera. YOUTUBE
"Why Does My ADHD Kid Always Forget?". Dr. K covers Understanding the kidβs experience, Dysregulated limbic system, Habit circuitry, and more. YOUTUBE
End the phone-based childhood now. The environment in which kids grow up today is hostile to human development. THEATLANTIC
In this most cinematic film ever made about screws, you'll learn how to choose which screws to use. YOUTUBE
Things that don't work (or: Things where there's a case worth considering that they don't work all that well for most people.) SUBSTACK
π Quote
When you write a story, youβre telling yourself the story. When you rewrite, your main job is taking out all the things that are not the story.
π οΈContinue reading
That wraps up the website version of the Hive Five. Subscribe now and access the following must-see sections (tools, resources, watch, listen) in the upcoming newsletter straight in your inbox.
Donβt want to miss out? Get access today. Elevate your experience with a premium membership, granting exclusive entry to the Hive Archive, and unlocking additional benefits.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- β’ Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- β’ Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- β’ EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- β’ MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- β’ Deep DISCOUNTS on paid content.
- β’ Experience continuously added NEW BENEFITS.