• Hive Five
  • Posts
  • 🐝 Hive Five #32 - Introductions and infographics

🐝 Hive Five #32 - Introductions and infographics

Hi friend,

Greetings from the hive!

I hope you had a wonderful weekend. Happy Raksha bandhan to all that celebrated! I learned about this festival on the Bugcrowd discord.

I went tubing, that's where you float down a river on an inner tube, and I managed to not get burned! Hurray.

Let's take this week by swarm!

🐝 The Bee's Knees

  1. From Pwn2Own 2021: A New Attack Surface on Microsoft Exchange - ProxyShell!: In April 2021, Orange Tsai from DEVCORE Research Team demonstrated a remote code execution vulnerability in Microsoft Exchange during the Pwn2Own Vancouver 2021 contest. In doing so, he earned himself $200,000.

  2. How to Hack Apple ID: Everyone knows what’s inside a computer isn’t really real. It pretends to be, sure, hiding just under the pixels β€” but they promise you it isn’t. In the real world, everything has a certain mooring we’re all attuned to.

  3. John Lambert's infosec infographics.

  4. Common Open Redirection Bug Bounty Mistakes by codingo: Let's talk about open redirections, their impact, and common mistakes made when submitting them to bug bounty programs.

  5. Malicious PDF Generator: Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator. Used for penetration testing and/or red-teaming etc.

πŸ™πŸ» Enjoy This Newsletter?

  • Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.

πŸ”₯ Buzzworthy

βœ… Changelog

πŸ“… Events

  1. Women's Cyberjutsu workshop - Pwning networks, an introduction to network pentesting: On 9/19/2021 from 3:00 PM until 7:30 PM ET.

  2. Kishore Krishna started beginner spotlight series: Where beginners can ask questions and the community can reply/guide or even offer to mentor them.

  3. Heath Adams announces cloud based labs: They will have a custom built lab, say for PEH, that you can run and pay hourly fees on (at cost) at the click of a button.

  4. h@cktivitycon 2021 - September 18, 2021: a HackerOne hosted hacker conference built by the community for the community.

πŸŽ‰ Celebrate

πŸ’° Career Corner

  1. Vickie Li wants to know what your motivation/inspiration was for getting into security.

  2. Bugcrowd has a few open roles: like this Security Solutions Consultant role which is a remote-first role.

  3. Bishop Fox is expanding their redteam: Currently hiring Senior Red Teamers, U.S. Remote Focused on senior level experience.

  4. Lares is hiring Sr. Red Teamers and Sr. Pentesters: They took a candid approach to the job post, because they also like to have fun at work.

πŸ“° Articles

  1. Orwa Atyat Methodology In Recon And Finding Bugs & Their Methodology In Hunting Using Phone.

  2. Common mistakes when using permissions in Android: When an Android app needs access to sensitive resources on the device, the app developers make use of the permissions model.

  3. iOS Pentesting 101: It is no secret that mobile devices are on the rise.

  4. Blast Radius: DNS Takeovers: Patrik Hudak showcases his research into the impact DNS takeovers can have on companies.

  5. Web App Pentesting With Burp Suite Scan Profiles: With the introduction of the Configuration Library in Burp Suite 2.0’s release, they’ve been creating more and more predefined templates to use during our web application penetration tests.

πŸ“š Resources

  1. Collection of tools and methods created to aid in OSINT collection: Feel free to add to your own investigative toolkit, however you may NOT sell or host this without obtaining prior permission.

  2. How to get started in blockchain part 1 and part 2.

  3. HackTricks: Here you will find the typical flow that you should follow when pentesting one or more machines.

  4. Hacking k8 resources via Ben Sadeghipour.

  5. Alh4zr3d asked for fav obscure or recent pentest/red team tool.

πŸŽ₯ Videos

  1. John Jackson on joining Sakura: "To be honest I never thought I'd make a video like this in a million years."

  2. shenetworks explains ARP poisoning in 60 seconds.

  3. How to do Code Review - The Offensive Security Way.

  4. Hacker Heroes #10 - bug_dutch (Interview): Flo van der Vlist (@bug_dutch) is currently climbing the Intigriti leaderboard at light speed.

  5. How a global police force took down Emotet: How do you defeat a highly organised criminal gang when you don’t know who or where they are?

🎡 Audio

  1. Hacking Your Health - The Podcast: Episode 001 recorded and ready to go, an introduction to both @HackingDave & @bencanning87.

  2. The Privacy, Security, & OSINT Show: 224-Employment Privacy & Security.

  3. Weekend Drop - Swyx on Side Projects, Modern Web Podcast.

  4. BBC The Lazarus Heist - Hacking Hollywood: First episode of an excellent series about the Lazarus Group.

  5. The InfoSec & OSINT Show - 64 Daniel Cuthbert & Pen Testing with the ASVS: Daniel Cuthbert talks about the OWASP Application Security Verification Standard.

Get $100 to try DigitalOcean - The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.

Subscribe to the Hive Five to read the rest.

Become a paying subscriber of the Hive Five to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In

A subscription gets you:
Join a private Discord COMMUNITY: Engage in chat, uplift one another, grow together, and explore shared interests.
Access to COMPLETE HIVE ARCHIVE: Unlock a treasure trove of tools, resources, videos, and audio, catering to all your needs.
EXCLUSIVE & BONUS content: Delve into hundreds of curated links that didn't make it into the newsletter.
Experience continuously added NEW BENEFITS.