- Hive Five
- Posts
- π Hive Five 54 β Calling Bullshit
π Hive Five 54 β Calling Bullshit
Hi friends,
Greetings from the hive!
I hope you had a good weekend. I'm continuing on my self-improvement journey and added journaling to my arsenal.
After finishing the book Can't Hurt Me, I'm now reading Range: Why Generalists Triumph in a Specialized World.
When was the last time you did something for the first time?
Let's take this week by swarm!
π The Bee's Knees
DON'T call yourself a hacker...: John Hammond answers Premier's tweet, referencing the blog post Your Value Comes From Your Output by Daniel Miessler.
How to do Code Review - The Offensive Security Way: In this session, we will explore how source code analysis can lead to finding vulnerabilities in large enterprise codebases.
The Cyber Plumber's Handbook: This repo contains the PDF book The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
Stealing administrative JWT's through post auth SSRF (CVE-2021-22056): The advisory for this issue can be found here. The CVE for this issue is CVE-2021-22056.
Abusing Reverse Proxies, Part 1: Metadata: Many cloud service providers offer a "metadata" service on their virtual machines. These services offer sensitive details about the instance and cloud operating environment. Metadata services offer REST APIs to programmatically retrieve this data. Abusing Reverse Proxies, Part 2: Internal Access.
ππ» Support the Hive
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
π₯ Buzzworthy
β Changelog
Latest iteration of axiom-exec: Control fleets interactively (beta), evaluate complex one-liners, itβs faster!
Shodan introduces the internetDB API: Fast IP lookups for open ports and vulnerabilities.
π Current Events
Bounty Hunters hackathon: Make an awesome new hacking tool, share it with us and the world, and win a cash prize.
Secure Software Summit 2022: Inaugural Secure Software Summit, which brings together leading innovators and practitioners of secure software development on January 27, 2022.
π Celebrate
Jonathan is awarded the first-ever Dan Kaminsky Fellowship: Wonderful!
_justYnot turned 22: Congrats!
iQimpz passed the 2k mark on Intigriti: Let's go!
π° Career Corner
Best choice you made for your career?: Casey asks.
NCCGroup hiring Senior Security Consultant: Join their Hardware and Embedded Systems team.
AssetNote is hiring a Security Researcher: Remote, full time.
Cloud Architect job: If you've got experience with Cloud Native architecture and want to research and work with emerging technology, this might be a good opportunity. Location: Hyderabad, India.
π° Articles
The Tale of a Click leading to RCE: In todayβs industry, we often hear that humans may weaken a companyβs security leading to a potential breach.
Cosmos Team Created a Custom Exploit for CVE-2021-35211: Learn more about fuzzing, see it in action, and start using it in your own projects.
Debugging a Java application with decompiled source code: When reviewing a local Java-based target for vulnerabilities the first thing they do is decompile the class files into Java with the aid of several decompilers such as CFR, Procyon, etc, then load it into an IDE.
CVE-2021-45467: CWP CentOS Web Panel β preauth RCE: CentOS Web Panel or commonly known as CWP is a popular web hosting management software, used by over 200,000 unique servers, that can be found on Shodan or Census.
security.txt adoption in Switzerland: Recently, @ant0inet (Antoine) tweeted about a cursory scan they did against the .ch TLD to determine how many security.txt files are hosted on the .ch zone.
π Resources
Favorite talks selected by speakers themselves: Great question by Ian Coldwater!
Craziest pentest stories: Luke Tucker wants to know the gnarliest thing youβve seen or experienced with a client or found while bug hunting.
Bug Bounty standards: This repository is a list of situations that occur in bug bounty programs and how they should be handled.
OSINT tools collection: @cyb_detective shares different services, techniques, tricks and notes about OSINT and more.
π₯ Videos
Visual application security testing with ZAP and Simon Bennetts: Keith Hoodlet, Field Security Architect, chats with Simon Bennetts about OWASP Zed Attack Proxy (ZAP) the world's most used open source web application security tool.
Finding security vulnerabilities with GitHub's new code search: GitHub is about to publicly release a brand new code search - Luke got to try out the early access version and it's scary. But awesome.
Introduction to Fuzzing: Binary Exploitation (Spike, Boo-Fuzz, Boo-Gen, and Custom Scripts): Busra Demir publishes another educational video on exploit development.
π΅ Audio
WeHackPurple podcast episode 50 with guest Adam Shostack: In this episode host Tanya Janca learns about Threat Modelling with guest Adam Shostack.
Human Factor Security Episode 176 - Sam Humphries: In this episode Jenny chats with Sam Humphries of Exabeam.
Breadcrumbs episode 16 - Find Some Way to Like Reporting with BB King.
Smashing Security 258 - Tesla remote hijacks and revolting YouTubers.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- β’ Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- β’ Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- β’ EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- β’ MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- β’ Deep DISCOUNTS on paid content.
- β’ Experience continuously added NEW BENEFITS.