Bug Bytes #50 – Null Bytes Worth $40K, Getting Your First Bug & Tab Tricks
By Intigriti
December 24, 2019
Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the week from 13 to 20 of December.
intigriti news
.@Randstad just launched a responsible disclosure program with an a-ma-zing scope! Check it out 😎
👉 https://t.co/Xf0qiCPmVq 👈 #HackWithIntigriti pic.twitter.com/jc5cTWgTet— Intigriti (@intigriti) December 19, 2019
Our favorite 5 hacking items
1. Tutorials of the week
– From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13
– Anyone Can Check for Magecart with Just the Browser
– Ngrok your DockerSploit
These are excellent tutorials to learn about:
iOS app pentesting. It’s THE tutorial you were waiting for. Everything is explained: Jailbreak with checkra1n, installing Frida and Objection, proxying traffic with Burp, bypassing certificate pinning with SSL Kill Switch 2, bypass Jailbreak detection, etc.
Detecting Magecart. Useful for penetration testers who want to know which indicators to keep an eye for to detect infected sites.
The poor man’s VPS setup. Useful for tests involving reverse shells and out of band vulnerabilities. No credit card required.
2. Writeup of the week
Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty ($40,000)
I have a bad memory of buffer overflows from my university days. But this writeup describes a type of overflows that is relatively easy to understand and exploit remotely on Web apps.
@samwcyo was trying to re-register existing usernames. He tried adding special characters (like null byte, CRLF characters, spaces, Unicode…) hoping that they would be removed during the registration process.
The vulnerability is that each null byte inserted was replaced with random data, e.g.:
Request: POST /register?username=victim%00@domain.com
Response: username victimIdL@domain.com
So, injecting multiple null bytes (victim%00%00%00@domain.com) made the server return chunks of memory that contained very sensitive data (SSH keys, passwords, usernames, etc).
3. Videos of the week
Finding Your First Bug: Getting Started on a Target (Part 1) & Part 2
@InsiderPhD continues to delight us with new video tutorials on “Finding your first bug”. This series is excellent for anyone starting out in bug bounties or who wants to get into Web app penetration testing.
A lot of things are covered from creating your own testing methodology to recon, note taking, what to look for, etc.
4. Tip of the week
This is for firefox users, especially those of us who always have 20+ tabs open. The 9 features mentioned include synchronization between devices, sending tabs to another device, muting tabs, etc.
I find this very helpful for organizing tabs (and reducing anxiety).
5. Tools of the week
Two cool Python tools to help with recon automation. Silver by @s0md3v is a wrapper around Masscan, Nmap and Vulners. Flumberbuckets by @fellchase is for S3 bucket hunting.
Other amazing things we stumbled upon this week
Videos
Learning Server Side Request Forgery (SSRF) Basics Using Portswigger’s Web Security Academy
Cybertalk – EP4 – IDA Pro, Malware Analysis & Python Libraries
How to find vulnerabilities by source code review and how to write scripts to exfiltrate data
Podcasts
Webinars & Webcasts
Hacking Common AD Misconfigurations (Free registration required)
Popping Shells Instead of Alert Boxes: Weaponizing XSS for Fun and Profit & Github repo
Conferences
Tutorials
Medium to advanced
Beginners corner
Pass the Hash (in French)
Writeups
Challenge writeups
Responsible(ish) disclosure writeups
TP-Link Archer Router Vulnerability Voids Admin Password, Can Allow Remote Takeover #Web
[Exploitation] D-Link DAP-1860 Vulnerability #RCE # Web #CodeReview
Kids Tracker Watches: CloudPets, exploiting athletes and hijacking reality TV #API #IoT
CVE-2019–17555: DoS via Retry-After header in Apache Olingo #CodeReview
From iPhone to NT AUTHORITY\SYSTEM #Windows #PrivilegeEscalation
From dropbox(updater) to NT AUTHORITY\SYSTEM #Windows #PrivilegeEscalation
Signal Desktop Windows Elevation of Privilege Vulnerability #Windows #PrivilegeEscalation
Bug bounty writeups
Uncontrolled Resource Consumption in any Markdown field using Mermaid on GitLab ($1,000)
Git flag injection – local file overwrite to remote code execution ($12,000)
Group search with Elastic search enable leaks unrelated data ($7,000)
See more writeups on The list of bug bounty writeups.
Tools
If you don’t have time
ReconCobra: Complete Automated pentest framework for Information Gathering
CustomHeader: Automatic Add New Header To Entire BurpSuite HTTP Requests
FindScript: Scrape Google and Github to find JS or similar files from a given URL
Unfurl (online version), Source code & Bookmarklet, Introduction & Difference with @tomnomnom’s unfurl
More tools, if you have time
SecretX: Extracting APIs and keys from a list of URLs using regex
Cypher Injection Scanner: Burp Suite Extension that detects Cypher code injection in applications using Neo4j databases
Dnstwister: Online domain name permutation engine
Credcheck & Introduction: Credentials Checking Framework
Scout: URL fuzzer in Go for discovering undisclosed files and directories on a web server
Koala Toolkit: Bug bounty toolkit for Docker
alpyntest: A Docker image embedding modern Python3 pentest tools (impacket, pypykatz, lsassy, ntlmrecon, enum4linuxpy, ldapsearch-ad, CrackMapExec…) to avoid dependencies wreckage on your system
Rubeus2ccache: Generates ccache files directly from Rubeus dump output
Search-SMB: A wrapper shell script for CrackMapExec that will grab all the SMB shares and search readable ones for your search term
Misc. pentest & bug bounty resources
Cheatsheet for finding vulnerable PHP code using grep #CodeReview
APIsecurity.io Issue 62: Vulnerabilities in Amazon Ring Neighbors and Droom, WebSocket API security
Challenges
Articles
Crypto Scam Investigation: Using Spiderfoot HX For OSINT Automation
Javascript Anti Debugging — Some Next Level Sh*t (Part 1 — Abusing SourceMappingURL)
News
Bug bounty & Pentest news
Trace Labs Global Missing CTF III: An OSINT CTF for Missing Persons
New Web Security Academy topic: Access control vulnerabilities and privilege escalation
Bugcrowd Launches CrowdStream and In-Platform Coordinated Disclosure
Reports
Cybersecurity: This password-stealing hacking campaign is targeting governments around the world
Operation Wocao: Shining a light on one of China’s hidden hacking groups
Vulnerabilities
Plundervolt – stealing secrets by starving your computer of voltage
One in every 172 active RSA certificates are vulnerable to attack
Web Cache Deception attacks still impact websites with ‘substantial user populations’
Hackers keep dumping Ring credentials online ‘for the giggles’
Breaches & Attacks
Hiding malware downloads in Taylor Swift pics! New SophosLabs report
Get in line! 38,000 students and staff forced to queue for new passwords
A thief stole unencrypted hard drives filled with 29,000 Facebook employees’ information
Other news
Google charts progress in developing Site Isolation browser technology
A guide to DNS-over-HTTPS – how a new web protocol aims to protect your privacy online
Edward Snowden’s book profits must go to the government, judge rules
Non technical
Breaking out of the Shellcode: Jeff Moss on Mr. Robot and hacking movies
Two-Factor Authentication vs. Multi-Factor Authentication: Differences Explained
How to effectively break up your time for maximum productivity
Tweeted this week
We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 12/13/2019 to 12/20/2019.
Disclaimer:
The views and opinions expressed in this article are those of the curators and do not necessarily reflect the position of intigriti.
Curated by Pentester Land & Sponsored by Intigriti
You may also like
Intigriti Bug Bytes #220 - January 2025 🚀
January 10, 2025
Intigriti Bug Bytes #219 - December 2024 🎅
December 13, 2024
Bug Bytes #218 – Advent of Cyber, RCEs and hacking poems
December 6, 2023