Bug Bytes #23 – 20K IDOR Trick, Bug Bounty Vloggers everywhere & Persistent Burp Collaborator
By Intigriti
June 18, 2019
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series are curated by Mariem, better known as PentesterLand. Every week, she keeps us updated with a comprehensive list of all write-ups, tools, tutorials and resources we should not have missed.
Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.
This issue covers the week from 07 to 14 of June.
intigriti news
The European Commission launched a public bug bounty program for DSS (Digital Signature Services)
@MattiBijnens shows how he and his team earned €20.000 at an intigriti live hacking event with an IDOR trick:
MUST-READ: learn how @MattiBijnens and his team earned a whopping €20K with one IDOR trick at an @intigriti live hacking event! #HackWithIntigriti #BugBounty #WriteUphttps://t.co/lZ0CZgejs9
— Intigriti (@intigriti) June 14, 2019
Our favorite 5 hacking items
1. Conference of the week
BSides London 2019, especially:
– Understanding Stress, Anxiety And Depression And How To Cope
Stress, anxiety and depression are three health risks that we should all be aware of and have strategies to avoid. This talk is a perfect reminder of their distinctions, why they affect us and what to do to avoid them or to get better.
This is very helpful especially for us, hackers, who can spend days in front of our computers, forgetting to exercise, sleep or eat properly.
2. Writeup of the week
This is the writeup of an unsual kind of IDOR found during a live hacking event.
Arne Swinnen, Matti Bijnens & Jeroen Beckers were able to bypass several defense mechanisms including encrypted parameters. The thought process is very detailed and so interesting that I can’t summarize it in a few lines. Check out the article, it’s worth it!
3. Video of the week
To be honest, last week was so crazy busy that I haven’t had the time to watch this video yet. But it is on the top of my list!
Apart from the technical details, getting advice from one of the top bug hunters is perfect for getting you into the right hacking mindset.
Live mentoring is an awesome opportunity especially if you’re just starting out.
4. Tool of the week
BurpJSLinkFinder is a Burp Suite plugin that passively detects JS files and scans them for endpoint links.
If you are planning to do some JavaScript code analysis/ bug hunting on Web apps, you really want to try it.
It is very helpful because until now you had to export JS files then run a tool like LinkFinder on them to find new endpoints. Such a time saver!
5. Tutorial of the week
If you have played with Burp Collaborator before, you know that Collaborator sessions are closed as soon as you close Burp. That’s not very practical if you need to shut down your laptop and resume tests later.
This tutorial shows a way around this. Basically, you launch Wireshark and sniff out communications between Burp and the Collaborator server. You should see a secret key pertaining to your Collaborator session. This is what will allow you to query the Collaborator server at any time even after closing Burp.
This solution is not perfect but it is a workaround until Portswigger releases a new feature to save Collaborator sessions.
Other amazing things we stumbled upon this week
Videos
Podcasts
Risky Business #545 — US Government loses control of customs mugshot database
Application Security Podcast – Caroline Wong — Self-care and self-aware for security people
Security In Five – Episode 512 – Google Is Making It Easy For You To Dump Chrome
Purple Squad Security – Episode 57 – Tinker After Dark – Tinker Tales by the Fire
Webinars & Webcasts
InfoSec Girls + OWASP WIA knowledge exchange webinar – 08 June 2019
OWASP DevSlop Show: Catching Secrets in the Cloud with Pawel Rzepa!
OWASP DevSlop Show: Security Code Review 101 with Paul Ionescu!
Conferences
Slides only
Tutorials
Medium to advanced
Attacking Weakly-Configured EAP-TLS Wireless Infrastructures
Exploiting ViewState Deserialization using Blacklist3r and YSoSerial.Net
Analyzing ARP to Discover & Exploit Stale Network Address Configurations
Bypassing CrowdStrike in an enterprise production network [in 3 different ways]
Brute Forcing Accounts that have logged onto an AD joined computer
Beginners corner
Exploit PoC: Linux command execution on Vim/Neovim vulnerability (CVE-2019–12735)
LDAP SWISS ARMY KNIFE – A directory server for LDAP client analysis and exploitation
Linux for Pentester: Wget Privilege Escalation , ZIP Privilege Escalation & Find Privilege Escalation
Writeups
Challenge writeups
Pentest writeups
Responsible disclosure writeups
Bug bounty writeups
Information disclosure on GitLab & additional info ($3,500)
Authorization flaw on Shopify ($2,000)
XML Entity Expansion (Billion Laughs Attack) on Central Security Project
Denial of Service on Facebook ($1,000)
See more writeups on The list of bug bounty writeups.
Tools
If you don’t have time
Malcolm: A powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files) and Zeek logs
BKScan: BlueKeep scanner supporting NLA (Network Level Authentication)
BurpTabEssentials: This changes the style of Burp Suite’s Repeater tabs to help the testers
Blue: A web-panel designed to make reconnaissance faster and easier accessible
Deeplack: Deeplack is a python script designed for comparing images (screenshots) using DeepAI to detect changes on websites & push notifications to Slack
Yaazhini: Free Android APK & API Vulnerability Scanner
More tools, if you have time
Python .DS_Store parser: A library for parsing .DS_Store files and extracting file names
href-urls.sh: Bash script that takes a text file containing URLs & creates an HTML file containing clickable links (of these same URLs)
Cloud_metadata_extractor: Cloud metadata extraction tools and scripts
Rustbuster: DirBuster for Rust
burp-subdomains: Burp Suite extension to easily export sub domains
WayRobots: Tool to find stored robots.txt files from the past
Kali Customize Script: Script for Kali that adds a bunch of tools and customizes it to be much better
TOR Router: A tool that allows you to make TOR your default gateway & send all internet connections under TOR (as transparent proxy) for increased privacy/anonymity without extra unnecessary code
s3-ransomware-bucket-check.py: Python script for checking Amazon S3 bucket configurations & detecting buckets vulnerable to ransomware
Using Nmap to extract Windows host and domain information via RDP
Eavesarp: Analyze ARP requests to identify hosts that are communicating with one another
FB-search: Free OSINT tool / Interface to the new Facebook search engine
Misc. pentest & bug bounty resources
Challenges
Articles
Exploiting CVE-2019-1040 – Combining relay vulnerabilities for RCE and Domain Admin
Want to take over the Java ecosystem? All you need is a MITM!
News
Bug bounty / Pentest news
The HackerOne Top 10 Most Impactful and Rewarded Vulnerability Types
The Web Security Academy labs are now covered by Portswigger’s bug bounty program
OWASP Top 10 of security risks for APIs – Draft available for review
Reports
2019 State of the Internet / Security: Web Attacks and Gaming Abuse
SQL Injection Attacks: So Old, but Still So Relevant. Here’s Why (Charts)
Vulnerabilities
Warning: Google Researcher Drops Windows 10 Zero-Day Security Bomb
New Pervasive Worm Exploiting Linux Exim Server Vulnerability
RAMBleed Attack Can Steal Sensitive Data From Computer Memory
Breaches & Attacks
The GoldBrute botnet is trying to crack open 1.5 million RDP servers
A Year Later, U.S. Government Websites Are Still Redirecting to Hardcore Porn: Open redirect exploited in the wild
Cybercrooks using text-based images in phishing emails to bypass spam filters
That push notification on your phone might be a phishing attempt
Microsoft Warns of Email Attacks Executing Code Using an Old Bug
Malicious apps/sites
Other news
GitHub platform improvements are helping orgs keep their dependencies in check
Facebook Quietly Changes Search Tool Used by Investigators, Abused By Companies
Non technical
Tweeted this week
We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 05/31/2019 to 06/07/2019.
Subscribe to the newsletter here!
Disclaimer:
The views and opinions expressed in this article are those of the curators and do not necessarily reflect the position of intigriti.
Curated by Pentester Land & Sponsored by Intigriti
You may also like
Intigriti Bug Bytes #220 - January 2025 🚀
January 10, 2025
Intigriti Bug Bytes #219 - December 2024 🎅
December 13, 2024
Bug Bytes #218 – Advent of Cyber, RCEs and hacking poems
December 6, 2023