• Hive Five
  • Posts
  • 🐝 Hive Five 75 – InfoSec: The Good, the Bad and the Ugly

🐝 Hive Five 75 – InfoSec: The Good, the Bad and the Ugly

Hi friends,

Greetings from the hive!

Happy belated Father's day. I hope you were able to recharge over the weekend.

Let's take this week by swarm!

🐝 The Bee's Knees

  1. Pentesting vs. Bug Bounty vs. Pentesting ???: What is the difference between Pentesting and Pentesting? There are different jobs that can be described as "pentesting" and LiveOverflow wants to talk a bit about it. This should also help you to better organize your own learning, as you better understand your goal.

  2. Bug Bounty Redacted #4 - Writing to S3 buckets & Insecure JWT Implementation: Welcome to AssetNote's series called Bug Bounty Redacted! In this series they will be going through reports they have submitted to bug bounty programs over the last five years.

  3. Bug Bounty 101 #23 - From $0 to $150,000/mo - Hacking Methodology & Mindset: $0/mo to $150,000/mo. If you are struggling to find any bugs in bug bounty, maybe it's time to change a thing or two. In this video, Z-Wink discusses what he believes are the most important factors to being successful in bug bounty hunting as laid-out in an easy to follow multi step formula.

  4. The ugly side of collaboration in bug bounties: TL;DR when money is involved, things can get ugly. Your best bet is to be clear about the terms up-front and stick to the 50/50 rule. Don't share information with people you don't have the privilege to.

  5. Hacking 6.5+ million websites => CVE-2022-29455 (Elementor): It all started during the Hackerone ambassador WorldCup. While scanning their selected target websites they found an interesting wordpress website. After a quick scan for known plugins we found a wordpress plugin installed named "Elementor".

πŸ™ Support the Hive

Enjoy reading the Hive Five? Consider sponsoring the next edition.

You can also follow me on Twitter.

πŸ”₯ Buzzworthy

βœ… Changelog

  1. Introducing Bugcrowd Researcher Templates: Templates can be found open source at github.com/bugcrowd/templates.

  2. New UUID Formats: IETF proposal (draft) to add new UUID versions (from v6 to v8).

πŸŽ‰ Celebrate

πŸ’° Career Corner

  1. Dave Kennedy on a massive problem in the security industry: "We have brand new candidates lacking "hands on" experience coming into the workforce and finding it extremely difficult to find a job. [...]" Jason Haddix agrees.

  2. Robinhood is hiring a Software Engineer, Application Security.

  3. hermit is looking for a new opportunity: "I just realized I'm a researcher first, and a developer (or whatever else I need to be to support my research) second. hmu if you're hiring sec researchers :)"

  4. A hackers guide to FINDING cybersecurity jobs: Getting your foot in the door or finding your next gig in cyber security is sometimes a daunting task. Just like hacking, a methodology is needed to succeed.

  5. A super talented friend of shell is looking for a senior/lead/staff software engineer position: If you have any leads, let them know either in the replies or via DM!

⚑️ From the Community

  1. I'll take something bug bounty related for $5000, Alex hakluke.

  2. Crowd-sourced advice for people that truly hate their job via STΓ–K.

  3. MrTuxracer's Security Advisories.

  4. How shenetworks Became a Network Engineer at Cisco.

  5. Open House - Real Property OSINT and Researching Public Records: Discover what is considered public record with regards to real property in the United States and how to conduct research to learn about real property, owners, and encumbrances on real property.

πŸ“° Articles

  1. Personal Access Token Disclosure in Asana Desktop Application: This post gives an insight into a sensitive data exposure vulnerability in Asana for Mac that was rated as P1 and was awarded a bounty.

  2. How to - Look for TLS private keys on Docker Hub: TL/DR: It’s becoming increasingly easy to compromise sensitive information for attackers to take advantage of. In this post, Detectify security researcher Alfred Berg wrote about how one can hunt for secrets over the whole docker hub.

  3. If OpenSSL were a GUI: "When something exceeds your ability to understand how it works, it sort of becomes magical. - Jony Ive"

  4. Chaining vulnerabilities to criticality in Progress WhatsUp Gold: Once in a while, you come across the perfect storm of vulnerabilities that may be assessed as a medium risk on their own, but when combined they can lead to a critical impact.

  5. The anatomy of a cryptocurrency scam: The story starts from a reddit bot post that went to an interesting image link.

πŸ“š Resources

  1. Going to DEFCON for the first time?: Here's what you can do!

  2. curl user survey 2022 analysis.

  3. OWASP Top 10 in 10 Min! (Kinda).

  4. Awesome RCE techniques: Awesome list of techniques to achieve Remote Code Execution (RCE) on various apps.

  5. SVG SSRF Cheatsheet: Hosts that process SVG can potentially be vulnerable to SSRF, LFI, XSS, RCE because of the rich feature set of SVG.

πŸŽ₯ Videos

🎡 Audio

  1. Human Factory Security #182 - Philippe Humeau: On this episode, Jenny talks with Philippe Humeau the CEO of CrowdSec.

  2. The Privacy, Security, & OSINT Show #266 - The Sole Proprietorship: This week, they explain the privacy benefits of a sole proprietorship with corresponding EIN.

  3. Smashing Security #279 - Encrypted notes, and a deadly case of AirTag spying.

  4. Darknet Diaries #119 - Hot Wallets: In this episode we hear from journalist Geoff White who talks about some of the recent crypto currency heists that have been happening. Geoff has been tracking a group of thieves for some time and shares his knowledge of what he’s found.

  5. Malicious Life - Hackers vs. Spies - The Stratfor Leaks, Pt. 2: In June 2011, a Con Edison truck was parked outside of Hector Monsegur's New York apartment, every day for over a week. Hector - better known as Sabu, the ringleader of the LulzSec hacking group - wasn't fooled: he guessed, correctly, that the FBI was on to him.

Get $100 to try DigitalOcean - The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.

Subscribe to the Hive Five to read the rest.

Become a paying subscriber of the Hive Five to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In

A subscription gets you:
Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
Experience continuously added NEW BENEFITS.