- Hive Five
- Posts
- 🐝 Hive Five 59 – Stay curious
🐝 Hive Five 59 – Stay curious
Hi friends,
Greetings from the hive!
I hope you are doing well, and most importantly, you are safe in these continuously trying times. My heart goes out to Ukraine and anyone who currently has to worry for their well-being and home.
Let's take this week by swarm!
🐝 The Bee's Knees
UnChained- Blockchain Security Conference 2022: ‘UnChained’ is a collaborative initiative of RazzorSec and QuillAudits with an aim to spread awareness about Blockchain Security. The conference brings on board various domain experts from the Blockchain. Day 2.
Jack Cable Talks About His Background, Bug Bounty Methodology, and Hacking the US Government: Jack Cable is a security researcher, hacker and student. He is known for his participation in bug bounty programs, including placing first in the U.S. Department of Defense's Hack the Air Force challenge.
OAuth 2.0 and OpenID Connect (in plain English): Developer Advocate Nate Barbettini breaks down OpenID and OAuth 2.0 in Plain English.
How to Secure Anything: Security engineering is the discipline of building secure systems. Its lessons are not just applicable to computer security. In fact, in this repo, they aim to document a process for securing anything, whether it's a medieval castle, an art museum, or a computer network.
tmp.0ut Volume 2: The tmp.0ut Staff welcomes you to another exciting release, this second issue of the zine is about ELF binaries. They say: "Special thanks to grenlith, koronkowy, barbie, and hexadecim8 for their help with this zine. Don't ever let them take your curiosity away from you."
🙏🏻 Support the Hive
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
🔥 Buzzworthy
✅ Changelog
📅 Events
Joe Grand's Open Lab: YouTube Live AMA - Mar 12, 2022: Since the release of their Trezor One wallet hacking video, they've received a lot of questions about engineering, hacking, and life in general.
🎉 Celebrate
Tanya Janca bought a farm. Awesome!
HackerOne's Champions of the Ambassador World Cup 2022 are the Bordeaux HackerOne club: Congrats!
Ananda got themselves a bug bounty bike: Let's go!
InfoSec Community's first ever virtual conference was a great success: Well done!
Dominic wrote another blog post since they last did a year ago: Can't wait to read it!
💰 Career Corner
Tinker on how to tell someone you don’t want regular 1:1s with them: "These 1:1s are going well, but I don't believe we need to have then on a rotating basis. Let's move to ad hoc. I'll schedule the next one as the need comes up. If something urgent comes up on your end in the mean time, let me know and I'll make time for you."
Marcus J. Carey's 2/25/2022 Cybersecurity Job Thread: Including remote, entry level, and intern positions.
Bugcrowd is hiring a Principal Security Engineer to support the appeals team: Come make a difference.
Choate, Hall & Stewart LLP is hiring an InfoSec engineer: In the Boston area with great compensation and work/life balance.
📰 Articles
The Elite Hackers of the FSB: For almost two decades, hackers with Snake have been forcing their way into government networks. They are considered one of the most dangerous hacker groups in the world.
OAuth and PostMessage: An OAuth misconfiguration was discovered in the redirect_uri parameter at the target’s OAuth IDP, which allowed attackers to control the path of the callback endpoint using the ../ character.
Logic Flaw Leading to RCE in Dynamicweb 9.5.0 - 9.12.7: When auditing enterprise applications, it’s important to not only focus on concrete vulnerability classes, but also on logic flaws which may have significant impact if exploited. This security research was performed by Shubham Shah. The CVE for this issue is CVE-2022-25369.
Write up – Android Application Screen Lock bypass via adb brute forcing by omespino: A short story about how simulate android keystrokes virtually in order to perform a brute-forcing attack with adb tools.
Behind the stalkerware network spilling the private phone data of hundreds of thousands: Much of the spyware you hear of today are the powerful nation-state-backed exploits that can quietly and remotely hack into iPhones anywhere in the world.
📚 Resources
Awesome Tunneling: List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.
Free tools for investigating digital ads: These investigations require an understanding of how digital advertising works, and the many ways people exploit the system.
Subdomains Tools Review - a full and detailed comparison of subdomain enumeration tools: The enumeration of subdomains is part of an almost mandatory process when attacking a new target. However, there are dozens of tools to perform this task, using as many different sources and techniques.
Awesome Cloud Security: A curated list of awesome cloud security related resources.
🎥 Videos
Bug Bounty Podcast - CoinDesk, Zabbix, and Leaking Secrets Through Mirrored Repos: Let's talk about "sidedoors" this week, with two vulnerabilities abusing alternative access points, along with an overly verbose error message that actually had some immediate impact, and a look at the challenges of client-sided session.
Interview With Loránd Bodó - OSINT Jobs: A talk with Loránd Bodó (@LorandBodo) about his new project OSINT Jobs, a platform that shares hand-picked, OSINT-related job openings and helps the OSINT community grow their skills and advance their careers.
Crazy JSP Web Shell to Exploit Tomcat - Real World CTF 2022: This was a hard web CTF challenge involving a JSP file upload with very restricted character sets. They had to use the Expression Language (EL) to construct useful primitives and upload an ascii-only .jar file.
List Database Content For Further Exploitation: Learn about SQL Injection vulnerabilities. In this video, you are going to have a look at how to examine a database for table and columns that can be further used in a UNION payload.
🎵 Audio
Smashing Security #263 - Problèmes de Weefeee, AI artists, and Web 3.0: Ooh la la! Horreur Wi-Fi en France! Some folks have experienced the drawbacks of Web 3.0 as their NFTs are stolen, and should computers own the copyright over the art they produce?
Privacy, Security & OSINT #252 - Secure Communications Conversion: This week they discuss new conversion methods which encourage others in your life to start using secure messaging instead of SMS, plus the latest privacy news.
Darknet Diaries #111 - ZeuS: ZeuS is a banking trojan. Designed to steal money from online bank user’s accounts. This trojan became big, that it resulted in one of the biggest FBI operations ever.
Malicious Life - Crypto AG, Part 2, The Death of Bo Jr.: How did Boris Hagelin succeed in selling compromised cipher machines to half the world, for more than 50 years?
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- • Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- • Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- • EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- • MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- • Deep DISCOUNTS on paid content.
- • Experience continuously added NEW BENEFITS.