- Hive Five
- Posts
- ๐ Hive Five 98 โ Car vulnerabilities, hacking on a plane, and AI inception
๐ Hive Five 98 โ Car vulnerabilities, hacking on a plane, and AI inception
Photo by Ross Parmly / Unsplash
Hi friends,
Greetings from the hive!
I hope you had an enjoyable weekend. I am seeking my next challenge and would welcome any recommendations or opportunities.
As a seasoned software engineer focused on front-end web development, I have over 11 years of experience. Besides honing my skills in this area, I have also successfully built and led several thriving technical communities. I am passionate about user experience and cybersecurity and always look for ways to improve and stay ahead of the curve.
If you know of a company or project that aligns with my skills and interests, please don't hesitate to reach out. I am eager to explore new possibilities and make a meaningful contribution. Thank you!
Let's take this week by swarm!
๐ The Bee's Knees
The best examples of ChatGPT, from OpenAI: more | essay speedrun | repo | VM inception
Sam Curry et al recently found a vulnerability affecting Hyundai and Genesis vehicles where we could remotely control the locks, engine, horn, headlights, and trunk of vehicles made after 2012. more
Hacking on a plane: Leaking data of millions and taking over any account. This is a short write-up about how they could have accessed the personal and financial information for tens of millions of users as well as take over anyoneโs account without user interaction. more
XSS on account[.]leagueoflegends[.]com via easyXDM (2016) - This post contains a chain of vulnerabilities that were responsibly disclosed to Riot Games in November of 2016. more
CTF - Puget Sound write-up by d0nut, the creator. The goal was to make a Rust challenge that defied expectations, and reshaped participants understanding of Rust. more
๏ธ๐ช Sponsor
Want me to write about your company? Sponsor the Hive Five.
๐ฅ Buzzworthy
โ Changelog
๐ Events
Michael Bazzell finished the first draft of the 10th edition of OSINT Techniques and going through final editing. Available in January 2023. more
Ben announced this year's NahamCon2020EU speaker lineup. more
IWCON 2022 | InfoSec Community has 15+ amazing cybersecurity speakers from around the world. more
Nicolas Grรฉgoire is giving his "Mastering Burp Suite Pro" training during @NorthSec_io 2023 (from May 23rd to 26th). more
HackTheBox December special coupon code for 50% off. more
๐ Celebrate
Utz got their eJPT. Let's go! more
Osirys had a good month in November for hunting. Awesome! more
Farah Hawa did an exciting thing. Wow! more
bsysop is top 4 in the Bugcrowd leaderboard of November. Amazing! more
Nathaniel has - 17 submissions in ~2 weeks. 15 criticals on a mature program. Get 'em! more
๐ฐ Career
The Path to Senior Engineer (from a Senior Engineer at Netflix) - It's important to note be a good teammate while trying to achieve personal goals. more
BSidesCharm 2022 - Job Hunt Like A Hacker by Jason Blanchard. more
Hiring Without Whiteboards is a list of companies (or teams) that don't do "whiteboard" interviews. more
โก๏ธ Community
Nathaniel's favourite part of hacking is immersing himself in a new attack surface and often not finding issues for weeks until he understand what he's working with and begin to chip away at it slowly. more
Jack Rhysider is taking a personal break from DarknetDiaries. That means no scheduling for Jan, Feb, or Mar. more
Six2dez is refactoring the whole reconFTW code, making it modular, more readable, easier to debug and being able to add your own modules. more
People's favorite purchases with Bug Bounty money. more
Julien Ahrens hacker con schedule for 2023 currently looks like this, May: OffensiveCon/Berlin June: Recon/Montreal August: BlackHat+Defcon/Vegas. more
๐ฐ Read
Another car vulnerability that led to remote commands on every internet connected Nissan & Infiniti. more
Sam Curry and co did even more car hacking! Earlier this year, they were able to remotely unlock, start, locate, flash, and honk any remotely connected Honda, Nissan, Infiniti, and Acura vehicles, completely unauthorized, knowing only the VIN number of the car. more
Napkin Ideas Around What Changes to Expect Post-ChatGPT. more
HackerOne ambassador spotlight with Emperor. more
๐ Resources
People's favorite text editor via renniepak. more
Dockerized Bug Bounty Automation Demo! (Automation Series) - This is a short demo video about how to go from code to deployed with docker. more
takito1812/web-hacking-playground. Web Hacking Playground is a controlled web hacking environment. It consists of vulnerabilities found in real cases, both in pentests and in Bug Bounty programs. more
yeswehack/vulnerable-code-snippets. YesWeHack present code snippets containing several different vulnerabilities to practice your code analysis. The code snippets are beginner friendly but suitable for all levels! more
immunefi-team/Web3-Security-Library. This is a collaborative repository that aims to contain all the information you need to start or expand your knowledge in web3 security. more
๐ฅ Watch
Try Hack Me! Advent of Cyber 2022 Day #3 OSINT Walk-Through. more
HackTheBox - Carpediem walkthrough. more
How to Find MFA Bypasses in Conditional Access Policies - Conditional access policies allow organizations to create fine-grained controls over how MFA is applied during authentication to Microsoft services such as Microsoft 365 and Azure. more
2022 Vegas Bug Bash with Bugcrowd. The worlds top-notch ethical bug hunters travel to Vegas for the 2022 Bugcrowd Bug Bash with two industry leading Bugcrowd customers. Check out their unique stories and what theyโve learned along the way. more
๐ต Listen
DAY[0] 171 Bug Bounty Podcast - Tailscale RCE, an SQLi in PAM360, and Exploiting Backstage - Some RCE chains starting with DNS rebinding, always fun to see, a fairly basic SQL injection, and a JS sandbox escape for RCE in Spotify. more
Malicious Life - Norse Corp.: How To NOT build a cybersecurity startup. more
The Privacy, Security, & OSINT Show #285 - Travel Security Revisited. This week Jason joins me to revisit travel security protocols. If you have travel planned this holiday season, consider our privacy and security tips. more
Jammer! He Just Wanted Privacy, But This Little Device Caused Big Trouble. more
Subscribe to Premium to read the rest.
Become a paying subscriber of Premium to get access to this post and other subscriber-only content.
Already a paying subscriber? Sign In.
A subscription gets you:
- โข Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
- โข Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
- โข EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
- โข MEMBER-ONLY events: Take part in digital meetups, focus sessions, and more.
- โข Deep DISCOUNTS on paid content.
- โข Experience continuously added NEW BENEFITS.