
Photo by Nicholas Green / Unsplash
Hi friends,
Greetings from the hive!
I hope you had a good time during my absence. I made it back from DEF CON but I was accompanied by Covid. I spent this past week recovering. Though I'm still not 100%, here's this week's Hive Five and a short rant.
I'm not a fan of American lawn culture. It feels obsessive. Not to mention that it doesn't look appealing at all to me. What prompted this was Adriana's war on lawns.
More shine to real nature, creativity, and being different.
Let's take this week by swarm!
🐝 The Bee's Knees
IDORs with unpredictable IDs are valid vulnerabilities: It’s an eye-door, get it? There is an interesting debate around bug reports of IDORs with IDs which are not predictable.
Web Hacker's Weapons: A collection of cool tools used by Web hackers.
🙏 Support the Hive
Enjoy reading the Hive Five? Consider sponsoring the next edition.
You can also follow me on Twitter.
🔥 Buzzworthy
✅ Changelog
Findomain v8.2.0: It's a release with minor changes, security fixes, some development configurations added and that's it.
ysoserial.net v1.35: Deserialization payload generator for a variety of .NET formatters.
📅 Events
Uncurled – the presentation Tuesday August 23, 2022: Everything Daniel knows and learned about running and maintaining Open Source projects for three decades.
🎉 Celebrate
Ben broke his large bounty cycle: Let's go!
Nagli had a blast in Vegas: On to the next one!
XNL-н4cĸ3r ended their bounty drought: Congrats!
Ben Bidmead got a new job: Have fun!
💰 Career Corner
⚡️ From the Community
d0nut's dream is to no longer work a 9-5: Instead he wants to build really cool, high performance, high quality rust tools and libraries.
sw33tLie had a blast at the Vegas Bug Bash: "I hope everyone doing bug bounties gets to experience a LHE at least once. It feels unreal to meet all the folks you've been working with in the past years."
📰 Articles & Threads
Things TESS learned at the Bugcrowd Bug Bash: "There's seriously a lot going in the backend when we make a submission. [...]"
Intro to Cross-chain bridges and its security: Blockchain enables various opportunities for its users. There are many takes on how blockchain should behave and what it should offer.
Discovering Domains via a Time-Correlation Attack on Certificate Transparency: Many modern websites employ an automatic issuance and renewal of TLS certificates. For enterprises, there are DigiCert services. For everyone else, there are free services such as Let’s Encrypt and ZeroSSL. There is a flaw in a way that deployment of TLS certificates might be set up.
📚 Resources
dh0ck/Wi-Fi-Pentesting-Cheatsheet: Personal notes used to pass the OSWP exam.
trickest/wordlists: These wordlists are based on the source code of the CMSes/servers/frameworks here.
payloadbox/sql-injection-payload-list: SQL Injection Payload List.
Command Line Text Processing: From finding text to search and replace, from sorting to beautifying text and more.
🎥 Videos
Discover Vulnerabilities in Intel CPUs!: In this video we explore the basic ideas behind CPU vulnerabilities and have a closer look at RIDL.
🎵 Audio
The New Guy at the Office Is a Secret Super Hacker - Darknet Diaries Ep. 36 - Jeremy From Marketing: Penetration testers are good guys, hired by companies to hack into their own networks by any means necessary. Pro hacker and ex-marine "Tinker" goes undercover as a marketing temp for the toughest crack of his career.
Smashing Security 286 - Hackers doxxed, Pornhub probs, and Co-op security measures: Pornhub has a problem, the UK's Co-op supermarket is accused of big brother tactics, and we take a look at a security researcher's attempt to reveal the true identify of hackers.
Get $100 to try DigitalOcean. The go-to VPS for bug bounty hunters. I use it for all of my own recon and automation needs, plus it also doubles as a VPN. They have every cloud resource you need at an affordable price.