- Hive Five
- Posts
- π Hive Five 73 β Best new infosec projects, how to add value, web hacking summer school
π Hive Five 73 β Best new infosec projects, how to add value, web hacking summer school
Hi friends,
Greetings from the hive!
I hope you're doing well. This week I spent some time thinking about copying and remixing in life. First, imitate, then innovate, as David Perell puts it. What resurfaced this thought for me was the recent blog post by Daniel on Just Copy What Works.
What habits and behaviors are you building?
Let's take this week by swarm!
π The Bee's Knees
Could I Hack into Google Cloud?: Google announced the Google Cloud Platform (GCP) Prize 2021 - 133.337$ for the best bug bounty report for the Google Cloud Platform.
Best Hacking Podcast in the world?: An interview with Jack Rhysider - the creator of Darknet Diaries: True stories from the dark side of the Internet.
The NahamCon2022 playlist is available now: Check out zseano's talk and more!
Best new infosec projects via Michael Skelton: What are the best new infosec @github projects you've stumbled upon lately?
From open redirect to RCE in one week: In this article, they will tell you a story of how they chained multiple security issues to achieve RCE on several hosts of the Mail.Ru Group (or VK now).
π Support the Hive
Enjoy reading the Hive Five? Consider sponsoring the next edition or buying me a coffee.
You can also share the newsletter with your friends and follow me on Twitter.
π₯ Buzzworthy
β Changelog
nuclei CVE-2022-26134 template: Scanning for Confluence - Remote Code Execution via OGNL template injection.
π Events
RSA Conference 2022 - Jun. 6 - 9, 2022: the worldβs leading cybersecurity event offering a multitude of opportunities to learn valuable insights, network with peers, and get hands-on with cutting-edge demos.
π Celebrate
Damian hit a solid bug bounty milestone: On to the next one!
chompie crushed her talk without slides: Let's go!
John Hammond hit 400k on YouTube: Grats!
Cool things people achieved via Hakluke: Awesome to see!
shenetworks recorded 7 videos: Welcome back!
π° Career Corner
Sara Vieira - How To Deal With Burnout and Learning To Say No: We all know that saying 'no' is important in life. Saying 'no' is a common tip in virtually every self help book, but that doesn't mean it's easy to do.
Social Engineer Your Way Into Your First InfoSec Job with Volkis: Exploring what you should be doing to land your first role in the world of infosec, how to stand out from the competition, what βproversβ you should have pre-prepared, and what certs you need (spoilers: none).
β‘οΈ From the Community
renniepak's first in-person LHE: "Start of my 3rd LHE next week. My first in person event! Also, as scheduled: IMPOSTER SYNDROME."
People saying nice things about each other via Ray [REDACTED].
Yassine reflecting on how much the bug bounty landscape has evolved.
Katie announced her web hacking summer school: She's going to be releasing 2 courses, for free on YouTube one on everything bug bounty and another on API hacking.
π° Articles
Arbitrary File Upload Tricks In Java: The main talking points are how to bypass file name detection when uploading arbitrary file.
How to get into bug hunting: "The main thing you need to become aware of, is that, simply the act of reading code, learning more things, is progress. Finding bugs is not an indicator of progress.. and in the first few years it should not be your end goal. Just learn to enjoy reading code and learning more about it."
How a Little-Known Solana Feature Made Program Vaults Unsafe - Exploring Solana Core Part 1: Over the past year and a half, they have spent a lot of time looking at the Solana core code, reporting over 80 bugs of varying severity.
Port Scanner Shootout: Port scanning also plays a large part in Vulnerability and Asset Management.
Finding command execution sinks in decompiled JVM languages: When reverse engineering an application that is shipped as compiled bytecode (jar file, war file, class files, etc.), you normally use a decompiler and then audit the resulting Java code.
π Resources
Rana on JWTs and CSRF: Answering the question: "If the application uses JWTs, does that mean the application is not vulnerable to CSRF?"
Training courses and certs that impressed people via Jonathan.
Selection of the top HackerOne reports: All reports' raw info stored in data.csv.
Through the Wire: A proof of concept exploit for CVE-2022-26134, an OGNL injection vulnerability affecting Atlassian Confluence Server and Data Center versions
π₯ Videos
Debunking Putinβs Propaganda | Super Users: Benjamin Strick and his team at The Centre For Information Resilience forensically analyze, document and geolocate videos from the ground, to get the story straight, and gather evidence for potential accountability in the future.
InfoSec Unplugged - Flight Attendant to Security Engineer w/ Metisha Harper: Former flight attendant turned security professional, blogger and podcaster, Metisha Harper.
π΅ Audio
Human Factory Security #181 - Breaking Barriers Women In CyberSecurity: Jenny chats with Saman Fatima, Aastha Sahni and Shrutirupa Banerjiee about how they came together for BBWIC, the vision and plans for this initiative.
The Privacy, Security, & OSINT Show #264 - Back to Basics Linux I: This week they return to the basics and start with Linux. Whether you are ready to make the switch or have been using Linux for years, there is something here for everyone.
Smashing Security #277 - Bad bots, cheeky ransoms, and good deepfakes.
Darknet Diaries #118 - Hot Swaps: This is the story of Joseph Harris. When he was a young teen he got involved with stealing video game accounts and selling them for money. This set him on a course where he flew higher and higher until he got burned.
Malicious Life - Catching a cybercriminal: AbdelKader Cornelius, a German Threat Researcher and an expert on the cybercrime ecosystem in German-speaking countries - shares a story about how he helped the German police put a sophisticated local cybercriminal behind bars, by uncovering tiny mistakes that this hacker did in the past.
Get $100 to try DigitalOcean - The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- β’ Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- β’ Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- β’ EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- β’ MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- β’ Deep DISCOUNTS on paid content.
- β’ Experience continuously added NEW BENEFITS.