- Hive Five
- Posts
- 🐝 Hive Five 80 – Most common smart contract vulnerabilities, practical deep learning course, and ProjectDiscovery’s Best Kept Secrets
🐝 Hive Five 80 – Most common smart contract vulnerabilities, practical deep learning course, and ProjectDiscovery’s Best Kept Secrets
Photo by Tanner Boriack / Unsplash
Hi friends,
Greetings from the hive!
I hope you had a good weekend.
We watched a movie called The Innocents (original title: Les innocentes). I share the same sentiment as this critics consensus: "The Innocents isn't always easy to watch, but its nuanced exploration of complex themes -- and its refreshing perspective -- are well worth the effort."
What did you do this weekend?
Let's take this week by swarm!
🐝 The Bee's Knees
Most common smart contract vulnerabilities by Adrian Hetman: Many of the examples will be well known to people familiar with the web3 security. What makes this interesting, is how common these vulnerabilities are even after many hacks involving them.
Practical Deep Learning: This free course is designed for people (and bunnies!) with some coding experience who want to learn how to apply deep learning and machine learning to practical problems. Deep learning can do all kinds of amazing things.
The Same Origin Policy - Hacker History: In 1995 Netscape invented JavaScript (LiveScript) and it marked the start of client-side web security issues. In this video we explore this history and learn about the same origin policy (SOP).
WordPress Transposh - Exploiting a Blind SQL Injection via XSS: Here’s the story about how you could chain three of these CVEs to go from unauthenticated visitor to admin. This effectively means that an attacker could already influence the (translated) content on a WordPress site, which is shown to all visitors.
ProjectDiscovery's Best Kept Secrets: For those unaware, ProjectDiscovery is a group of talented hackers and creators that have massively disrupted the offensive tooling industry by creating tooling that genuinely makes the lives of hackers easier.
🙏 Support the Hive
Enjoy reading the Hive Five? Consider sponsoring the next edition.
You can also follow me on Twitter.
🔥 Buzzworthy
✅ Changelog
Waymore v1.3: You can now pass input using STDIN, and pass links output to STDOUT.
unfurl v0.4.3: Pull out bits of URLs provided on stdin.
xnLinkFinder v1.3: It now also gets potential parameters. Fixed an issue with v1.2 that stopped it getting output for Burp and Zap files.
Burp Suite 2022.7.1: You can now configure tab-specific options for Repeater and automatically detect client-side prototype pollution sources using Burp Scanner.
gau v2.1.2: Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
📅 Events
DEF CON 30 is almost upon us:
EFF Poker Tournament at DEF CON 30: Security expert Tarah Wheeler will host EFF's first charity poker tournament at Bally's Poker Room on Friday, August 12.
Sick.Codes talk Demos, Exploits & Tools: 17:00 Saturday August 13th 2022 ETA: 5PM Track 1 Saturday.
Who will be there? Yassine Aboukir, Katie Paxton-Fear, and many more.
Security BSides Ahmedabad announcements:
spaceraccoon will be their closing keynote speaker.
Yassine: will be their second on-site Keynote Speaker.
🎉 Celebrate
Big shoutout to nikitastupin, sml555, sickcodes for maintaining the disclose.io Database: Thank you!
Alyssa Miller became a CISO: Many congrats!
Sean Melia return to bug bounty with a bang: Welcome back!
💰 Career Corner
⚡️ From the Community
PSA - Ryan Dewhurst is no longer at automattic: Thus also no longer has anything to do with WPScan.
What part of MCH2022's NOC looked like: 37 datenklos, 78 access switches, 112 access points, 41 OADM muxes, 5.7km of single-mode fiber, 1km of copper cat5e, 200Gbit/s of uplink, 450Gbit/s external capacity.
What awesome ladies are going to Defcon?: Cyber Kitten wants to know!
zseano wants a Burp Lite: "Just target, repeater and intruder. nothing else at all, just those."
📰 Articles & Threads
1001 ways to PWN prod - A tale of 60 RCE in 60 minutes: This article is the transcript of a talk (FR) Laluka gave for during the HitchHack in May 2022.
Guide to Picking an Attack Surface Management Solution: Attack Surface Management (ASM) a.k.a External Attack Surface Management (EASM) is a fast-growing trend in cybersecurity, and with good reason. The trend is born out of necessity.
Tag Blending Obfuscation In Property-Based Payloads: Property-based payloads are payloads based on some particular properties of the document object and the elements.
How bxmbn tests for Web Cache vulnerabilities + tips and tricks.
📚 Resources
A look inside a day with zseano: "I get up around 9am and spend time with Seb til 1pm, then I work 1pm - 5pm. Eat tea and chill with Seb til 630pm, then bed time. Then 7-9pm is me and Abi time, then 9pm-2am work. I don't work in the day on weekends, only 10pm - 2am each night"
Why people started hacking via hakluke: Using 3 words or less.
OAuth 2.0 Security Cheat Sheet: OAuth 2.0 is a standard that enables users to give websites access to their data/services at other websites.
🎥 Videos
Solution of PhrazeBoard Red: A team of 6 ( @i_v_a_k_i @jtobcat @omaru53684882 @0xteknogeek @bbuerhaus and @silver_anth ) solved PhrazeBoard RED & won the 7.77 ETH Grand Prize!
Attack Surface Management Series - EP1 - Certificate Transparency (In under 10 mins).
The Pivot | Julie Jones - How To Become A World-Class Investigator: After working as a police detective, undercover operator, and behavioral and geographic profiler for 10 years, Julie Jones enters the intelligence unit and develops her passion for technology by using the internet to investigate crimes.
You're Just Not My Type(state): It would be easier to build secure software if you couldn’t write the vulnerabilities in the first place. At least, that’s the idea with typestates - an approach to making dangerous code inexpressible.
🎵 Audio
Breadcrumbs - Episode 20. - Getting What You Pay For: Paid Search Services with Roelof Temmingh: Paying an organization to provide you with intelligence you either don't have access to or don't have the time to collect can expedite an investigation. But how does it work? Where does the intelligence come from? How do these businesses work?
Smashing Security #284 - The Most Wanted Missing CryptoQueen: In this special edition of the "Smashing Security" podcast, computer security veterans Graham Cluley and Carole Theriault welcome back author and journalist Jamie Bartlett - host of "The Missing CryptoQueen" podcast.
The Privacy, Security, & OSINT Show #271 - OSINT Tool Updates II: This week they provide another substantial list of updates to the new OSINT tools, explain all usage, and offer numerous housekeeping changes. Yes, it is another OSINT episode.
My First Million Pieter Levels - Making $2.7M A Year With No Employees: A solopreneur who makes nearly $3M a year with no employees while living a nomadic lifestyle.
Get $100 to try DigitalOcean - The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
🧰 Tools
Algorithm Visualizer: An interactive online platform that visualizes algorithms from code. Learning an algorithm gets much easier with visualizing it.
licensor: Write a license to standard output given its SPDX ID. A name for the copyright holder can optionally be provided for licenses where it is included.
tuc: When cut doesn't cut it.
Scanners Box: A powerful and open-source toolkit for hackers and security automation.
mgwls: Combines all single words from two wordlist files and concatenates them with each other, with optional delimiter.
💡 Tips
Never pass up an opportunity to watch someone do/configure something: via sysengineer.
Discord has sed support: The syntax is s//, with no trailing slash.
What I Got Wrong About Mentorship by Simon Sinek: Mentorship is like friendship: it evolves over time, and it's a two-way street.
🍯 Accounts to follow
Awesome accounts to follow. Randomly selected from my curated Twitter lists.
victoriadotdev: Victoria.dev | Skills for Tech Leaders | Software engineering leadership | Cybersecurity, core @owasp_wstg.
infosec_au: shubs | Co-founder, security researcher. Building an attack surface management platform, @assetnote.
FredKSchott: fred | @astrodotbuild co-creator • CEO of The Astro Company.
r0bre: r0bre | security research @neodyme | ctf @allesctf | lowlevel, rust, pwn, re, vim, shitposts, crypto.
JoakimTauren:Joakim Tauren | Head of Security Testing @visma. Speaker, hacking enthusiast.
🚀 Productivity
How thinking happens - Triangulation: Triangulation is using two known points to find a third point. Every version of sense making we do—every moment of every day—involves us triangulating information.
Spotify TUI: Spotify for the terminal written in Rust.
Capture the big picture with Maks Kuchur, founder of xTiles: Maks Kuchur is the founder of xTiles, a visual tool to organize information with card-based pages.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- • Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- • Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- • EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- • MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- • Deep DISCOUNTS on paid content.
- • Experience continuously added NEW BENEFITS.