- Hive Five
- Posts
- 🐝 Hive Five 83 – How to prepare for a tech talk, IDORs and UUIDs, and Web Hacker’s Weapons
🐝 Hive Five 83 – How to prepare for a tech talk, IDORs and UUIDs, and Web Hacker’s Weapons
Photo by Nicholas Green / Unsplash
Hi friends,
Greetings from the hive!
I hope you had a good time during my absence. I made it back from DEF CON but I was accompanied by Covid. I spent this past week recovering. Though I'm still not 100%, here's this week's Hive Five and a short rant.
I'm not a fan of American lawn culture. It feels obsessive. Not to mention that it doesn't look appealing at all to me. What prompted this was Adriana's war on lawns.
More shine to real nature, creativity, and being different.
Let's take this week by swarm!
🐝 The Bee's Knees
You Have One New Appwntment - Hacking Proprietary iCalendar Properties.
Kernel Exploitation on HEVD #2 : Write What Where (Arbitrary Overwrite).
How Chelsea does (and doesn’t) prepare a talk for a tech conference.
IDORs with unpredictable IDs are valid vulnerabilities: It’s an eye-door, get it? There is an interesting debate around bug reports of IDORs with IDs which are not predictable.
Web Hacker's Weapons: A collection of cool tools used by Web hackers.
🙏 Support the Hive
Enjoy reading the Hive Five? Consider sponsoring the next edition.
You can also follow me on Twitter.
🔥 Buzzworthy
✅ Changelog
Findomain v8.2.0: It's a release with minor changes, security fixes, some development configurations added and that's it.
ysoserial.net v1.35: Deserialization payload generator for a variety of .NET formatters.
📅 Events
Uncurled – the presentation Tuesday August 23, 2022: Everything Daniel knows and learned about running and maintaining Open Source projects for three decades.
🎉 Celebrate
Ben broke his large bounty cycle: Let's go!
Nagli had a blast in Vegas: On to the next one!
XNL-н4cĸ3r ended their bounty drought: Congrats!
Ben Bidmead got a new job: Have fun!
💰 Career Corner
⚡️ From the Community
d0nut's dream is to no longer work a 9-5: Instead he wants to build really cool, high performance, high quality rust tools and libraries.
sw33tLie had a blast at the Vegas Bug Bash: "I hope everyone doing bug bounties gets to experience a LHE at least once. It feels unreal to meet all the folks you've been working with in the past years."
dawgyg and Rhynorater are going to try and get the bug bounty monthly meet ups back on track.
📰 Articles & Threads
Things TESS learned at the Bugcrowd Bug Bash: "There's seriously a lot going in the backend when we make a submission. [...]"
Intro to Cross-chain bridges and its security: Blockchain enables various opportunities for its users. There are many takes on how blockchain should behave and what it should offer.
Discovering Domains via a Time-Correlation Attack on Certificate Transparency: Many modern websites employ an automatic issuance and renewal of TLS certificates. For enterprises, there are DigiCert services. For everyone else, there are free services such as Let’s Encrypt and ZeroSSL. There is a flaw in a way that deployment of TLS certificates might be set up.
IAM Whoever I Say IAM - Infiltrating VMWare Workspace ONE Access Using a 0-Click Exploit.
📚 Resources
dh0ck/Wi-Fi-Pentesting-Cheatsheet: Personal notes used to pass the OSWP exam.
trickest/wordlists: These wordlists are based on the source code of the CMSes/servers/frameworks here.
payloadbox/sql-injection-payload-list: SQL Injection Payload List.
Command Line Text Processing: From finding text to search and replace, from sorting to beautifying text and more.
🎥 Videos
An overlooked parameter leads to a critical SSRF in Dropbox bug bounty program.
Discover Vulnerabilities in Intel CPUs!: In this video we explore the basic ideas behind CPU vulnerabilities and have a closer look at RIDL.
Katie Paxton-Fear - The Bug Bounty Hunter & YouTube Creator.
🎵 Audio
The New Guy at the Office Is a Secret Super Hacker - Darknet Diaries Ep. 36 - Jeremy From Marketing: Penetration testers are good guys, hired by companies to hack into their own networks by any means necessary. Pro hacker and ex-marine "Tinker" goes undercover as a marketing temp for the toughest crack of his career.
Smashing Security 286 - Hackers doxxed, Pornhub probs, and Co-op security measures: Pornhub has a problem, the UK's Co-op supermarket is accused of big brother tactics, and we take a look at a security researcher's attempt to reveal the true identify of hackers.
Malicious Life - "A CISO's Nightmare": Israel Baron on Railway Security.
The Privacy, Security, & OSINT Show #275 - Archived Site Removal & Breaches Galore.
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- • Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- • Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- • EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- • MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- • Deep DISCOUNTS on paid content.
- • Experience continuously added NEW BENEFITS.