• Hive Five
  • Posts
  • 🐝 Hive Five 111 - Roadmap to Pentester success, and how to explain a layoff

🐝 Hive Five 111 - Roadmap to Pentester success, and how to explain a layoff

Hi friends,

Greetings from the hive!

I hope you are doing well. I always have this urge that I have to do better which has served me well. Here’s a perfect song that encompasses this.

How are you bettering yourself?

Let’s take this week by swarm!

🐝 The Bee’s Knees

  1. Alexandre Borges published a 7 part, 450 page, free, workshop-style, content series on Malware Analysis. more

  2. The best hacking courses & certifications. Your roadmap to Pentester success. more

  3. honoki/burp-digitalocean-droplet-proxy deploys a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet. more

  4. Traveling with OAuth - Account Takeover on Booking.com. OAuth (Open Authorization) is a modern, open authorization standard designed to allow cross-application access delegation – for example, allowing your application to read data from your Facebook profile. more

  5. A New Vector For “Dirty” Arbitrary File Write to RCE. Arbitrary file write (AFW) vulnerabilities in web application uploads can be a powerful tool for an attacker, potentially allowing them to escalate their privileges and even achieve remote code execution (RCE) on the server. more

️💪 Sponsor

Sponsor the Hive Five and reach a highly engaged community of engineers, security researchers, and ethical hackers who are at the forefront of the industry.

🔥 Buzzworthy

Changelog

  1. XNL-н4cĸ3r made many updates to their tools recently, so make sure to update! more

  2. DOMPurify 3.0.1 release. DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. more

  3. OSINTCurious’s last post: “…But we all know that being OSINT curious never required an official non-profit. It just required talented, curious, people like you and I…” more | stream

📅 Events

  1. Hack The Box - Cyber Apocalypse is back again on March 18-23. Extraordinary prizes (worth $35,000) and over 40 hacking challenges. more

  2. kernelcon training classes (April 12-13) have open registration. Defense in Depth Engineering, Introduction to Ghidra, Introduction to Python, and more. more

  3. Caido is trying something new. Join them for an hour on March 7th at 3PM EST to discuss anything security and Caido related. more

🎉 Celebrate

  1. Rana Khalil’s academy hit a new milestone of 1000 students. Amazing! more

  2. While XNL-н4cĸ3r appreciates everyone trying out their tools. We appreciate them for making and sharing their work. Thank you! more

  3. Stefan Rows got his first job as a web developer. Congrats! more

  4. RAJAT received their first bounty from Bugcrowd. more

💰 Career

  1. References for resume structure and content. more

  2. Advice for people wanting to get into the SOC analyst field. more

  3. How to explain a layoff: “Why did you leave your last job?”. more

⚡️ Community

  1. Michael Skelton put a deposit on cattle. more

  2. Ippsec’s thoughts on the New Hack The Box Seasons. more

  3. Katie’s reading 10 pages per day habit is going very well, and she recommends you to try it. more

  4. Check out the hacking station of Daniel Stenberg and the home of curl in Stockholm, Sweden. more

  5. Corgi had the pleasure of taking LaNMaSteR53’s Practical Web App Pentesting (PWAPT) course last week and thought it was phenomenal. more

📰 Read

  1. Jason Haddix hacked a search / cloud company. Giving him full access to every employees email & full source code for all of their apps. more

  2. Web Cache Poisoning - Capability to disable/deface the app.██████████.com (A tale of poisoning through the layers of caching). more

  3. Using Nuclei for OSINT, a 5-minute basic guide. Nuclei is a tool for scanning websites for vulnerabilities, but it can be used for a variety of investigative or scientific purposes. more

  4. CI/CD secrets extraction, tips and tricks. CI/CD (Continuous Integration / Continuous Delivery) systems are becoming more and more popular today. This can be explained by the difficulty to maintain and deploy multiple projects at the same time. more

  5. Kubernetes Security Part 1 - Security Contexts. Kubernetes is an open-source container orchestration system that has become a popular choice for managing and deploying containerized applications. However, as with any complex system, security is a critical concern. more

📚 Resources

  1. Jason shares free resources covering code literacy. Knowing how vulnerabilities are mitigated makes you a 10x engineer (sec or dev). more

  2. Het Mehta shares a mindmap of Firefox Add-ons For Penetration Testers. more

  3. nikasakandelidze/Single-Source-Of-Truth is a collection of popular and approved resources for learning different Computer Science or Software Engineering topics. more

  4. Good physical pentesting talks recommendations, such as “I’ll Let Myself In”. more

🎥 Watch

  1. Live Recon: Interviewing a Hacker - @rez0. more

  2. Docker Clinic, Pt. 1 by the Taggart Institute in which they review everything you need to get started with containers. more

  3. Broken Access Control - Lab #6 Method-based access control can be circumvented. This lab implements access control based partly on the HTTP method of requests. more

  4. We Hack Purple Podcast Episode 69 with Scott Helme. In episode 69, host Tanya Janca speaks to the only person on earth who is more excited about security headers than she is: Scott Helme of Report URI. more

  5. 10 Tips for DEF CON newbies. DEF CON is the greatest hacker conference in the world, despite it always being cancelled. more

🎵 Listen

  1. Binary Exploitation Podcast 192 - A GPU Bug and the World’s Worst Fuzzer Findings. more

  2. Bug Bounty Podcast 191 - Param Pollution in Golang, OpenEMR, and CRLF Injection. more

  3. Risky Business #697 - LastPass attacker: Do you gotta hand it to ’em? more

  4. Critical Thinking - Bug Bounty Podcast S01 E09 - Headless Browser SSRF & RebindMultiA Tool Release + Web3 Bug. more | tool

  5. The Privacy, Security, & OSINT Show 291 - Mobile App Security & Audio Transcription. more

Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.

Subscribe to the Hive Five to read the rest.

Become a paying subscriber of the Hive Five to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In

A subscription gets you:
Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
Experience continuously added NEW BENEFITS.