• Hive Five
  • Posts
  • ๐Ÿ Hive Five 78 โ€“ Dirty dancing, Reversing Malware, and Dorking on Steroids

๐Ÿ Hive Five 78 โ€“ Dirty dancing, Reversing Malware, and Dorking on Steroids

Hi friends,

Greetings from the hive!

I hope you had a good weekend. Eid Mubarak to all celebrating!

I spent this weekend on a variety of things. I did some networking, writing, and volunteering.

Let's take this week by swarm!

๐Ÿ The Bee's Knees

  1. Account hijacking using "dirty dancing" in sign-in OAuth-flows: About ten years ago, when bug bounties were just getting started, Frans was inspired by Nir Goldshlager and Egor Homakovโ€™s multiple blog posts about account hijacking related to OAuth.

  2. alh4zr3d talks about his background, Red Teaming, Security Certificates and more.

  3. Reversing Malware - Also How is APT 29 Successful with This Phishing Technique.

  4. Someone tried to hack samczsun with a crypto stealer: Learn about how the attack works, how to protect yourself, and some basic malware analysis.

  5. Abusing functionality to exploit a super SSRF in Jira Server (CVE-2022-26135): TL;DR Jira is vulnerable to SSRF which requires authentication to exploit. There are multiple ways to create user accounts on Jira in order to exploit this issue depending on the configuration of the Jira instance.

๐Ÿ™ Support the Hive

Enjoy reading the Hive Five? Consider sponsoring the next edition or buying me a coffee.

๐Ÿ”ฅ Buzzworthy

โœ… Changelog

๐ŸŽ‰ Celebrate

๐Ÿ’ฐ Career Corner

โšก๏ธ From the Community

  1. Bounty Thursdays is on summer break.

  2. STร–K started to enjoy the XSS process: "XSS bugs have never really been my thing. But lately I def have started to enjoy the process of reading JavaScripts, identifying, escaping, bypassing and maximizing impact."

  3. A sneak peek at Katie's API course: What is an API? What makes them special? And what kind of APIs are out there?

๐Ÿ“ฐ Articles & Threads

  1. A Case Study of API Vulnerabilities - Part 2, and Empty Heads: This writeup presents another thing to test for when you have a full-or-partial-read SSRF.

  2. An apple AirTag was put on Hannah to track her location: Now she's sharing what happened to her so you know what to look for.

  3. Dorking on Steroids: It is common knowledge that Google dorking is a powerful tool for finding just about anything on targets.

  4. Using SpiderFoot to Investigate Phishing Domains Targeting Ukrainian Soldiers.

  5. DoD Promotion Recon: pipsh wrote a quick write-up as to how to start doing recon, especially when it's a wide scope.

๐Ÿ“š Resources

  1. What people think makes a good Bug Bounty Program via Glenn.

  2. Nagli's top 10 Public HackerOne programs to hunt on in 2022.

  3. social-media-hacker-list: Growing list of apps and tools for enhancing social media experiences.

  4. Big List of Naughty Strings: An evolving list of strings which have a high probability of causing issues when used as user-input data.

๐ŸŽฅ Videos

  1. Farah's updated bug bounty resources.

  2. Find XXE with Burp Suite Intruder Content-Type Scanning: In this video, Z-Wink uses a HacktheBox environment to show how quickly scanning POST requests for different supported content-types can lead to XXE (which is a bug bounty P1).

  3. So You Think You Can Google? Workshop With Henk van Ess.

  4. Improving your secure code review skills #2 - Bug class exploration.

  5. HackerOne's live hacking events are back : Check it out while NahamSec shows you around.

๐ŸŽต Audio

  1. The Privacy, Security, & OSINT Show #269 - New OSINT Tools & Breach Data Lessons: This week they release the new online OSINT tools, offer three lessons from new breach data, and address several updates from past shows.

  2. Smashing Security #282 - Raising money through ransomware, China's mega-leak, and hackers for hire: A hacked university might have made a profit after paying a cryptocurrency ransom, China suffers possibly the biggest data breach in history, and Reuters investigates digital mercenaries.

Get $100 to try DigitalOcean - The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.

Subscribe to Premium to read the rest.

Become a paying subscriber of Premium to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In.

A subscription gets you:

  • โ€ข Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
  • โ€ข Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
  • โ€ข EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
  • โ€ข MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
  • โ€ข Deep DISCOUNTS on paid content.
  • โ€ข Experience continuously added NEW BENEFITS.