Bug Bytes #54 – Killing Snakes for Fun, Seagate RCE & Finding Bugs in API’s
By Intigriti
January 21, 2020
Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the week from 10 to 17 of January.
Our favorite 5 hacking items
1. Webinar of the week
SEC642: Killing snakes for fun, Flask SSTIs and RCEs in Python (Free registration required)
This is an excellent course on SSTIs with a focus on Python frameworks.
I love that it does not only explain how SSTIs work and how to escalate them to RCE, but it also mentions a lot of background information to understand the big picture: Why Python frameworks were created, how they work, the history of Python and Flask, etc.
2. Writeup of the week
Advisory | Seagate Central Storage Remote Code Execution 0day
This is a nice example of RCE found using security code review with a bottom-up approach. It also shows how to reverse and analyze the firmware of a NAS.
Both RCE and code review can be intimidating. But the way everything is broken in this writeup makes them seem easy to follow even for beginners.
3. Challenge of the week
There is a plethora of XSS challenges but labs for GraphQL bugs, JWT, SSRF, SSTI, lack of rate limiting, etc, are rarer. So, these labs are perfect if you want to play with these vulnerabilities and many others.
The best part is that detailed walkthroughs are provided for each bug.
4. Video of the week
As always, a great tutorial video by @InsiderPhD! I think this is the best introduction to APIs I’ve ever seen. It covers everything you need to start exploiting them ASAP: What APIs are, how to find and enumerate them, types of APIs (REST, SOAP, GraphQL), what is JSON, what bugs to look for, how to take notes, etc.
5. Tutorial of the week
Did you know that macros are not the only way to deal with CSRF tokens in Burp?
@Agarri_FR shows in great detail how to use Intruder Pitchfork to mimick manually replacing the CSRF token with the latest value sent by the server, and the advantages over macros.
Other amazing things we stumbled upon this week
Videos
Podcasts
[CPRadio] Domestic Kitten: An Iranian Surveillance Operation
Paul’s Security Weekly #635 – CVE-2020-0601, Netscaler RCE, npm
Security Weekly News #4 – Win 10 exploit, Tik Tok, Lottery Hacker
Security In Five Episode 661 – Microsoft Rolls Out New Browser, Whether You Want It Or Not
Webinars & Webcasts
Webinar: Burp-less Hacking – Learning Web Application Pentesting on a Budget (Free registration required)
How to Communicate about Security Vulnerabilities (Free registration required)
Operations Security (OPSEC) tradecraft tips for online Open Source Intelligence (OSINT) Research (Free registration required)
Conferences
Tutorials
Medium to advanced
Remote Code Execution in Three Acts: Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2 & Demo app
Operating system Detection using TTL value Powershell & Ping!
Stealing NTLMv2 hash by abusing SQL injection in File download functionality
Beginners corner
Writeups
Challenge writeups
Pentest writeups
Responsible(ish) disclosure writeups
Busting Cisco’s Beans :: Hardcoding Your Way to Hell & PoCs #RCE #Web #CodeReview
Breaching the perimeter – PhantomJS Arbitrary file read #Web
Critical Auth Bypass Vulnerability In InfiniteWP Client And WP Time Capsule #Web
From an Open Redirect in a Brazilian Bank to Session Token Leak #Web
Undisclosed CVE-2019–19484,CVE-2019–19486,CVE-2019–19487 #Web #RCE
Pwning Avast Secure Browser for fun and profit #RCE #BrowserExtensions
Bug bounty writeups
Arbitrary File Write as SYSTEM from unprivileged user ($1,250)
Adding a malicious notebook to be treated like a trusted notebook in Google Colab — 1337$ ($1,337)
Unrestricted file upload in www.semrush.com > /my_reports/api/v1/upload/image ($500)
Reflected XSS at https://pay.gold.razer.com escalated to account takeover ($750)
Tools
If you don’t have time
xpasn: Expands an autonomous system (AS) number into prefixes or individual host IP addresses
Velocity: DNS caching library for Python. Helps speed up network connections (applies to everything from sockets to HTTP requests)
SWFPFinder: SWF Potential Parameters Finder
GDA-android-reversing-Tool & Wiki: GDA is a new decompiler written entirely in c++, so it does not rely on the Java platform, which is succinct, portable and fast, and supports APK, DEX, ODEX, oat.
More tools, if you have time
Burp-IndicatorsOfVulnerability: Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack
Bug bounty in a box!: A payload callback server & payload generator for bug bounty
Dmap: Advanced Domain Mapper for bug bounty
Injectus: CRLF and open redirect fuzzer
Frida API Fuzzer: Experimetal fuzzer for API in-memory fuzzing
CHAPS – Configuration Hardening Assessment PowerShell Script
Lil Pwny: Auditing Active Directory passwords using multiprocessing in Python
AzureADRecon: A tool which gathers information about the Azure Active Directory given valid credentials. Useful for audits & post exploitation
Gtfo: Search for Unix binaries that can be exploited to bypass system security restrictions
PoisonHandler: A tool for performing lateral movement. It hides the command you are executing by registering a protocol handler
Misc. pentest & bug bounty resources
Challenges
Articles
An Empirical Study of Wireless Carrier Authentication for SIM Swaps
Mapping the Jan 2020 Java Security Patches Back to the Original Source Code Changes
Unusual Patch Tuesday
Microsoft’s January 2020 Patch Tuesday Fixes 49 Vulnerabilities
Microsoft fix of critical Windows bugs after NSA tip-off prompts questions
Google Chrome Adds Protection for NSA’s Windows CryptoAPI Flaw
CVE-2020-0601: the ChainOfFools/CurveBall attack explained with PoC
PoCs by Kudelski Security & by ollypwn
News
Bug bounty & Pentest news
Huntr: New bug bounty platform for fixing bugs in open-source code
MITRE launches ATT&CK for industrial control systems knowledge base
GitLab Celebrates Awarding $1 Million in Bounties to Hackers on HackerOne
Reports
Vulnerabilities
Google hackers successfully use remote exploit to hack iPhone
Microsoft warns about Internet Explorer zero-day, but no patch yet
Tails 4.2.2: Emergency release addresses critical Tor Browser vulnerability
How safe is your phone number? Study highlights mobile carriers’ failure to prevent SIM-swap attacks
Critical Cisco DCNM flaws: Patch right now as PoC exploits are released
Update now! Popular WordPress plugins have password bypass flaws
Breaches & Attacks
A hacker is patching Citrix servers to maintain exclusive access
Hackers Are Breaking Directly Into Telecom Companies to Take Over Customer Phone Numbers
Discord users warned over QR code login scam that can result in pwned accounts
Sodinokibi Ransomware Publishes Stolen Data for the First Time
Fleeceware is back in Google Play – massive fees for not much at all
Microsoft spots malicious npm package stealing data from UNIX systems
FBI: Nation-state actors have breached two US municipalities
Australia Bushfire Donors Affected by Credit Card Skimming Attack
FBI seizes WeLeakInfo, a website that sold access to breached data
Other news
Behavior Change in Chrome’s Download Protection Service Affecting Privacy
Microsoft’s New Edge Browser Released, What You Need to Know
US troops deploying to the Middle East told to leave personal devices at home
Inside Discord’s Thriving Black Market for Stolen Credit Cards and Gift Cards
Middle East tech’s biggest trends in 2019? Startups, 5G – and internet shutdowns
Russia responsible for hacking gas firm tied to Trump impeachment: report
Report: Chinese hacking group APT40 hides behind network of front companies
A win for privacy? Google plans to scrap user-agent string in Chrome
Non technical
Burnout linked to potentially deadly irregular heartbeat, study says
The Guy Who Invented Inbox Zero Says We’re All Doing It Wrong
The Difference Between Business Intelligence, Reporting, Metrics, and Analytics
Tweeted this week
We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 01/10/2020 to 01/17/2020.
The views and opinions expressed in this article are those of the curators and do not necessarily reflect the position of intigriti.
Curated by Pentester Land & Sponsored by Intigriti
You may also like
Intigriti Bug Bytes #220 - January 2025 🚀
January 10, 2025
Intigriti Bug Bytes #219 - December 2024 🎅
December 13, 2024
Bug Bytes #218 – Advent of Cyber, RCEs and hacking poems
December 6, 2023