- Hive Five
- Posts
- ๐ Hive Five 79 โ Mediocre security engineers and Empathy as a Service
๐ Hive Five 79 โ Mediocre security engineers and Empathy as a Service
Hi friends,
Greetings from the hive!
A recent Tweet of mine was a quote saying that life begins at the end of your comfort zone. I know that it can be scary. But, you have to trust the process.
Say you want to improve your writing. Turn it into a habit. Writing. Every. Day. Follow writers you admire, copy and remix their work. Create a swipe file of things that stand out to you and analyze it.
Speaking of writing, I finally released a new blog post. It might be a simple TIL post, but it still has value.
Through self-reflection, I noticed flaws that prevented me from posting. One of them was that I wouldn't post something unless I deemed it perfect, preventing me from posting anything.
So now, I'm identifying myself with the type of person I want to be by releasing earlier and iterating on it. Thus, not only increasing my luck surface but also establishing a bias towards action.
How are you challenging yourself? Let me know ๐
Let's take this week by swarm!
๐ The Bee's Knees
Bug Bounty Redacted #5 - Second Order Subdomain Takeovers & Logic Bug DoS.
BSidesSF 2022 - Keynote - We Need More Mediocre Security Engineers (Jackie Bow): The field of information security remains one of the most isolated - and at times, elitist - bastions in tech. We self-impose the highest cost of entry - be extraordinary or get out.
Exploiting Arbitrary Object Instantiations in PHP without Custom Classes: During an internal penetration test, they discovered an unauthenticated Arbitrary Object Instantiation vulnerability in LAM (LDAP Account Manager), a PHP application. PHPโs Arbitrary Object Instantiation is a flaw in which an attacker can create arbitrary objects.
Diana Initiative 2020 - Tracy Z. Maleeff - Empathy as a Service to Create a Culture of Security: So-called "soft skills" are greatly undervalued in the Information Security industry. The very core of security involves humans.
988 Suicide & Crisis Lifeline: A historical day for suicide prevention & mental health in the U.S.! The National Suicide Prevention Lifeline, now known as the 988 Suicide & Crisis Lifeline, can be more easily reached by calling or texting 988, or chatting on https://988lifeline.org/. Jen Easterly shared her own personal story last year.
๐ Support the Hive
Enjoy reading the Hive Five? Consider sponsoring the next edition or buying me a coffee.
You can also share the newsletter with your friends and follow me on Twitter.
๐ฅ Buzzworthy
โ Changelog
ProjectDiscovery TLSX release update: TLSX has been updated to include new options for detecting TLS misconfigurations.
DOMPurify 2.3.9: A DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG.
Vite 3 is out: Vite is powering a renewed innovation race in Web frameworks. Nuxt 3 uses Vite by default. SvelteKit, Astro, Hydrogen, and SolidStart are all built with Vite. Laravel has now decided to use Vite by default.
WAFW00F v2.2 Release: WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.
๐ Events
May Contain Hackers 2022 (July 22-26): Nicolas Grรฉgoire will be there too!
GirlsWhoHack Soldering Class - Hope Conf 7/22, 7/23, 7/24: The class is aimed at kids, adults are welcome if there is room.
๐ Celebrate
Ben's marriage visa was approved: Amazing news!
Aditya is traveling all over the UK: Have fun!
Valerio Brussani is listed as Hero in Synack's Acropolis: Congrats!
Ben started streaming on Twitch 3 years ago: Time flies!
๐ฐ Career Corner
โก๏ธ From the Community
Joo made ffuf stickers: Available at @MCH2022Camp (and possibly DEFCON).
Amazing hardware hackers to follow: via specters.
C1phy - Hacker Interview: A unique chance to sit down with C1phy/@marcolivermunz and ask him a couple of questions.
๐ฐ Articles
Itโs impossible to find every vulnerability, so we donโt try to: Security static analysis tools generally seem to throw a ton of false positives. Did you know thereโs a reason for that, thatโs rooted in math?
Going beyond Alert with XSS: This post discusses three XSS cases that they have escalated its vulnerability to higher severity in order to assess the possible risks.
Bug Bounty Collaboration and Manual Exploitation of an Interesting Boolean SQL Injection ยท H3K: This blog post describes how collaboration and re-checking your notes after a period of time can aid in finding critical vulnerabilities.
Get Your Kicks on Route Sixty-Sink - Identifying Vulnerabilities Using Automated Static Analysis: An open-source tool that enables defenders and security researchers alike to quickly identify vulnerabilities in any .NET assembly using automated source-to-sink analysis.
๐ Resources
Bug Bounty Wordlists: A repository that includes all the important wordlists used while bug hunting.
tanprathan/MobileApp-Pentest-Cheatsheet: The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Eradicating Vulnerability Classes slides (LocoMocoSec talk).
๐ฅ Videos
Z-winK's Bug Bounty Bootcamp: How to get started in ethical hacking and infosec.
More Z-winK - Hunting IDOR (Part 2): In this presentation, Z-winK will build on his latest series and will take you through a deeper dive into hunting IDOR (Insecure Direct Object Reference) for big dollars.
How to write a banger blogpost (Hacking the Google algorithm) - STรK Security Fest 2022: So you did some awesome research, wrote a pretty epic write-up and now you want to share the results with the world.
Command Injection - Lab #5 Command injection with out-of-band data exfiltration: In this video, Rana covers Lab #5 in the Command Injection module of the Web Security Academy.
๐ต Audio
The Privacy, Security, & OSINT Show #270 - OSINT Tool Updates: This week they explain numerous updates to the online OSINT search tools and offer some general usage tips.
Smashing Security #283 - Disney's social dumpster fire, Anom phones, and TikTok tragedies: A self-proclaimed "super hacker" causes problems in the Magic Kingdom, criminals regret trusting Anom phones, and law suits are filed against TikTok.
Layer 8 Podcast Episode 87 - Steven Harris, aka NixIntel: A talk with Steven Harris, aka @nixintel who is an Executive Board Member with @OSINTCurious and is currently employed by Qomplx to perform investigations. He also teaches SEC 487 for SANS.
Get $100 to try DigitalOcean - The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- โข Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- โข Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- โข EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- โข MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- โข Deep DISCOUNTS on paid content.
- โข Experience continuously added NEW BENEFITS.