• Hive Five
  • Posts
  • 🐝 Hive Five 73 – Best new infosec projects, how to add value, web hacking summer school

🐝 Hive Five 73 – Best new infosec projects, how to add value, web hacking summer school

Photo by MI PHAM / Unsplash

Hi friends,

Greetings from the hive!

I hope you're doing well. This week I spent some time thinking about copying and remixing in life. First, imitate, then innovate, as David Perell puts it. What resurfaced this thought for me was the recent blog post by Daniel on Just Copy What Works.

What habits and behaviors are you building?

Let's take this week by swarm!

🐝 The Bee's Knees

  1. Could I Hack into Google Cloud?: Google announced the Google Cloud Platform (GCP) Prize 2021 - 133.337$ for the best bug bounty report for the Google Cloud Platform.

  2. Best Hacking Podcast in the world?: An interview with Jack Rhysider - the creator of Darknet Diaries: True stories from the dark side of the Internet.

  3. The NahamCon2022 playlist is available now: Check out zseano's talk and more!

  4. Best new infosec projects via Michael Skelton: What are the best new infosec @github projects you've stumbled upon lately?

  5. From open redirect to RCE in one week: In this article, they will tell you a story of how they chained multiple security issues to achieve RCE on several hosts of the Mail.Ru Group (or VK now).

πŸ™ Support the Hive

Enjoy reading the Hive Five? Consider sponsoring the next edition or buying me a coffee.

πŸ”₯ Buzzworthy

βœ… Changelog

  1. nuclei CVE-2022-26134 template: Scanning for Confluence - Remote Code Execution via OGNL template injection.

πŸ“… Events

  1. RSA Conference 2022 - Jun. 6 - 9, 2022: the world’s leading cybersecurity event offering a multitude of opportunities to learn valuable insights, network with peers, and get hands-on with cutting-edge demos.

πŸŽ‰ Celebrate

πŸ’° Career Corner

  1. Detectify is hiring a Hacker Community Manager.

  2. Sara Vieira - How To Deal With Burnout and Learning To Say No: We all know that saying 'no' is important in life. Saying 'no' is a common tip in virtually every self help book, but that doesn't mean it's easy to do.

  3. Social Engineer Your Way Into Your First InfoSec Job with Volkis: Exploring what you should be doing to land your first role in the world of infosec, how to stand out from the competition, what β€˜provers’ you should have pre-prepared, and what certs you need (spoilers: none).

  4. Fastly is hiring a Director, Engineering - Resilience.

⚑️ From the Community

  1. How Yassine manages full-time traveling with bug hunting.

  2. renniepak's first in-person LHE: "Start of my 3rd LHE next week. My first in person event! Also, as scheduled: IMPOSTER SYNDROME."

  3. People saying nice things about each other via Ray [REDACTED].

  4. Yassine reflecting on how much the bug bounty landscape has evolved.

  5. Katie announced her web hacking summer school: She's going to be releasing 2 courses, for free on YouTube one on everything bug bounty and another on API hacking.

πŸ“° Articles

  1. Arbitrary File Upload Tricks In Java: The main talking points are how to bypass file name detection when uploading arbitrary file.

  2. How to get into bug hunting: "The main thing you need to become aware of, is that, simply the act of reading code, learning more things, is progress. Finding bugs is not an indicator of progress.. and in the first few years it should not be your end goal. Just learn to enjoy reading code and learning more about it."

  3. How a Little-Known Solana Feature Made Program Vaults Unsafe - Exploring Solana Core Part 1: Over the past year and a half, they have spent a lot of time looking at the Solana core code, reporting over 80 bugs of varying severity.

  4. Port Scanner Shootout: Port scanning also plays a large part in Vulnerability and Asset Management.

  5. Finding command execution sinks in decompiled JVM languages: When reverse engineering an application that is shipped as compiled bytecode (jar file, war file, class files, etc.), you normally use a decompiler and then audit the resulting Java code.

πŸ“š Resources

  1. xEHLE explaining the recent metamask clickjacking bug.

  2. Rana on JWTs and CSRF: Answering the question: "If the application uses JWTs, does that mean the application is not vulnerable to CSRF?"

  3. Training courses and certs that impressed people via Jonathan.

  4. Selection of the top HackerOne reports: All reports' raw info stored in data.csv.

  5. Through the Wire: A proof of concept exploit for CVE-2022-26134, an OGNL injection vulnerability affecting Atlassian Confluence Server and Data Center versions

πŸŽ₯ Videos

  1. Debunking Putin’s Propaganda | Super Users: Benjamin Strick and his team at The Centre For Information Resilience forensically analyze, document and geolocate videos from the ground, to get the story straight, and gather evidence for potential accountability in the future.

  2. Ippsec walking through HackTheBox - Timing.

  3. OFJAAAH et al interviewing Jason Haddix.

  4. InfoSec Unplugged - Flight Attendant to Security Engineer w/ Metisha Harper: Former flight attendant turned security professional, blogger and podcaster, Metisha Harper.

🎡 Audio

  1. Human Factory Security #181 - Breaking Barriers Women In CyberSecurity: Jenny chats with Saman Fatima, Aastha Sahni and Shrutirupa Banerjiee about how they came together for BBWIC, the vision and plans for this initiative.

  2. The Privacy, Security, & OSINT Show #264 - Back to Basics Linux I: This week they return to the basics and start with Linux. Whether you are ready to make the switch or have been using Linux for years, there is something here for everyone.

  3. Smashing Security #277 - Bad bots, cheeky ransoms, and good deepfakes.

  4. Darknet Diaries #118 - Hot Swaps: This is the story of Joseph Harris. When he was a young teen he got involved with stealing video game accounts and selling them for money. This set him on a course where he flew higher and higher until he got burned.

  5. Malicious Life - Catching a cybercriminal: AbdelKader Cornelius, a German Threat Researcher and an expert on the cybercrime ecosystem in German-speaking countries - shares a story about how he helped the German police put a sophisticated local cybercriminal behind bars, by uncovering tiny mistakes that this hacker did in the past.

Get $100 to try DigitalOcean - The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.

Subscribe to the Hive Five to read the rest.

Become a paying subscriber of the Hive Five to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In

A subscription gets you:
Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
Experience continuously added NEW BENEFITS.