- Hive Five
- Posts
- 🐝 Hive Five #23 – Grateful, curious, and cautious
🐝 Hive Five #23 – Grateful, curious, and cautious
Photo by Joakim Honkasalo / Unsplash
Hi friends,
Greetings from the hive!
I hope you had a great week and a relaxing weekend. STÖK tweeted about the importance of focusing and being truly grateful for what you have, and I couldn't agree more. To add to this, try having the mindset of acknowledging what you get to do instead of what you need to do.
Let's take this week by swarm!
🐝 The Bee's Knees
How to Analyze Code for Vulnerabilities: Vickie will go through the basics of how to review your code for vulnerabilities and some tactics for performing an effective security code review on your application.
Privilege escalation with polkit: How to get root on Linux with a seven-year-old bug: polkit is a system service installed by default on many Linux distributions. It’s used by systemd, so any Linux distribution that uses systemd also uses polkit.
Two weeks of securing Samsung devices: Part 1: After spending two weeks looking for security bugs in the pre-installed apps on Samsung devices, they were able to find multiple dangerous vulnerabilities.
Burp Macros: What, Why & How?: If so, then this blog is for you. Obviously, you can automate the process by writing a python code, however, that requires scripting knowledge. It also requires time and effort on your part to write the code. So, let’s try to overcome these challenges using Burp Macros.
How Hackers Used Slack to Break into EA Games: The group of hackers who stole a wealth of data from game publishing giant Electronic Arts broke into the company in part by tricking an employee over Slack to provide a login token, Motherboard has learned.
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
🔥 Buzzworthy
✅ Changelog
ho • no • ki: is trying something new, bbrf.me now defaults to a demo server so you can test BBRF without having to deploy your own server.
VSCode - Remote Repositories: With this, you can quickly browse, search, edit, and commit to any remote GitHub repository (and soon, Azure Repos) directly from within VS Code, no clone necessary.
Improving Report Quality through Submission Editing by the Bugcrowd ASE Team: Bugcrowd’s Application Security Engineers now have the ability to edit submissions when triaging vulnerability reports.
PwnMachineV2: a new version of the self hosted pwning environment for Bug Bounty: With this new version, you will have a full web interface, which will be better to use the different features.
📅 Events
STÖK️: His CHPO/STÖK colab signature blueglass / UV adaptable Smokey glasses drop in June.
🎉 Celebrate
💰 Jobs
VP, Information Security: Lead Netflix’s information security strategy, including product, studio, and enterprise security.
📰 Articles
Testing Two-Factor Authentication: This post provides a whirlwind tour of common 2FA mechanisms and detailed information on testing them.
What is a Prototype Pollution vulnerability and how does page-fetch help?: Prototype Pollution is a problem that can affect JavaScript applications.
Solution and explanation of tips for Intigriti's 0521 XSS challenge by GrumpinouT: GrumpinouT explains their solution for the challenge and the tips that were given.
Bypassing 2FA using OpenID Misconfiguration: Two factor authentication is rapidly becoming a norm in all authentication systems, however faulty implementation can often times render the defense mechanism useless.
Your E-Mail Validation Logic is Wrong: If you thought validating email was simple, it isn't.
📚 Resources
Best conference talks or print resources for up-and-coming-leaders Jason Haddix thread.
What makes you want to hack a bounty program? Ben Sadeghipour thread.
Active Scanning Techniques: This repository is a collection of different techniques in order to find specific hosts to scan.
🎥 Videos
SQL Injection - Lab #11 Blind SQL injection with conditional responses: This lab contains a blind SQL injection vulnerability.
Jackpotting Fortune-500 Treasuries - Martin Doyhenard & Gaston Traberg: In this talk, they will present two critical vulnerabilities recently found during our assessment performed over Oracle’s ERP, using them to introduce the audience to the ERP’s post-exploitation world.
Get $100 to try DigitalOcean - The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- • Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- • Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- • EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- • MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- • Deep DISCOUNTS on paid content.
- • Experience continuously added NEW BENEFITS.