Bug Bytes #202 – CAIDO, Finding your first bug, and OAuth
By travisintigriti
May 31, 2023
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the weeks from May 22nd to May 28th
Intigriti News
From my notebook
This week I’ve been thinking a lot about developing a specialism for hacking, being the kind of hacker who can find a bug anywhere because they’re an expert in a specific class or type of vulnerability, so here are some resources around that theme from my bookmarks!
Web Hacking with Caido – CAIDO is the new Burp replacement everyone is talking about
jq Injection [Jason – Hacky Easter 2023] – Really cool injection bug, demonstrated on a CTF
Bluetooth device hacking reading list – My number 1 suggestion if you’re feeling stuck with your hacking, get a specialism! Maybe bluetooth and IoT could be yours?
Narrative over numbers: Andreessen Horowitz’s State of Crypto report – This is a great look at why crypto and web3 have slowed down a bit and if it’s all hype
Google Fuzzing Forum – tutorials, examples, discussions, research proposals, and other resources related to fuzzing. – Another great specialism and a whole bunch of resources to learn it
Web Apps Hack and Learn “Let’s Play” Live with Teacher Gerald Auger.
Why You Shouldn’t Be An Ethical Hacker Part 3, Why You Shouldn’t Be An Ethical Hacker Part 4 (shorts)
Episode 20: Hacker Brain Hacks – Overcoming Bug Bounty’s Mental Tolls
214 – Exploiting VMware Workstation and the Return of CSG0-Days
EP122 Firewalls in the Cloud: How to Implement Trust Boundaries for Access Control
Episode 376 – Open Source Summit, who built your open source, and AI
Beginner
Intermediate
Advanced
Security Research
CVE-2023-31070 Broadcom BCM47xx SDK EMF slab-out-of-bounds write
Blog – What if we had the SockPuppet vulnerability in iOS 16? – Apple Security Research
A new OAuth vulnerability may impact hundreds of online services
Rooting with root cause: finding a variant of a Project Zero bug | The GitHub Blog
Dig Discovers Vulnerability in GCP CloudSQL Leads to Data Exposure
Bugs
Exploring the Infamous 51% Attack: A Comprehensive Analysis of Blockchain Vulnerabilities | 2023
Stored Cross Site Scripting (XSS) via Cross Site Request Forgery (CSRF)
A Unique Tale Of P1: Exposed GraphQL Leads to Mass User Account Takeovers
Utilizing Historical URLs of an Organization to successfully execute SQL queries — Blind SQLi
From Broken Object Level Authorization to the Massive Financial Attack
Price Manipulation Vulnerability: Potential Exploitation in Dating Website
How I found Reflected XSS in Users login page on Public Program ?
How I was able to access data of other users [Insecure Direct Object Reference]
Unveiling the Hidden Gems: A Bug Bounty Journey of Multiple Discoveries
I helped the top Indian health benefits management platform from major PII leak
CTF challenges
GitHub – mthbernardes/codeexplain.nvim: GPT powered nvim plugin that helps you understand code.
rebindMultiA – Tool To Perform a Multiple A Record Rebind Attack
Jsfinder – Fetches JavaScript Files Quickly And Comprehensively
katoolin3 – Get your favourite Kali Linux tools on Debian/Ubuntu/Linux Mint
espionage – Collects informations related to domains whois, history, dns records and more
wgen.io – Generate rich wordlists for targeted attacks online
You may also like
Intigriti Bug Bytes #219 - December 2024 🎅
December 13, 2024
Bug Bytes #218 – Advent of Cyber, RCEs and hacking poems
December 6, 2023