Bug Bytes #60 - Bypassing AWS signing, @samwcyo’s secrets and WordPress leaks
By Intigriti
March 5, 2020
Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the week from 21 to 28 of February.
Our favorite 5 hacking items
1. Conference of the week
So many good talks and prestigious speakers! Topics range from Web security to Cloud, Kubernetes, Credential stuffing, DevSecOps, Car hacking and more.
I’m starting with JWT Parkour – Louis Nyffenegger and Are You Properly Using JWTs? – Dmitry Sotnikov. What about you?
2. Writeup of the week
Write-up: AWS Document Signing Security Control Bypass ($1,000)
This is a writeup of an interesting bug found by analyzing a file upload functionality. It used AWS for storing documents uploaded, and AWS signing to authorize access to files.
By manipulating a request parameter, @ozgur_bbh was able to bypass the signing mechanism and access all documents in the S3 bucket.
3. Videos of the week
– @zlz Talks About How He Got Started, Recon, Hacking @Tesla, and Working With @Theparanoids
– How to Use Firefox Containers for Easy IDOR Hunting (With Demo!)
I don’t think I will ever get bored of watching interviews with hackers. This one is with @zlz. It is fascinating to learn about his thought process, his unique recon process, how he approaches full-time bug hunting, how he is able to get a sense of applications that are probably vulnerable based on past experience, etc.
The second video may be the fastest way to learn how to use Firefox Containers. They are very useful for both Web hacking (IDOR and authorization tests) and segregating accounts during normal navigation.
4. Article of the week
Gehaxelt – How WordPress Plugins Leak Sensitive Information Without You Noticing
This in an interesting read for anyone interested in doing research and submitting new modules to Detectify. @gehaxelt explains his process for analyzing the most popular WordPress plugins and finding information leaks.
5. Tutorial of the week
This tutorial might be helpful if you are struggling with certificate pinning bypass. @CaptMeelo shows a nice trick he used when Xposed Modules and Frida were not working.
He looked at the system log while the app was running. Certificate fingerprints appeared in the log. He decompiled the app, identified where the fingerprints were located and added one for his Burp certificate. Recompiling the app and running this patched version allowed him to bypass certificate pinning without having to modify smali code.
Other amazing things we stumbled upon this week
Videos
How Docker Works – Intro to Namespaces & Deepdive Containers – Kernel Sources and nsenter
My Entrepreneurial Journey – Episode 6: Revenue, Advertising, and Mayor Joe the Intern
Podcasts
Webinars & Webcasts
Adversary Emulation and the C2 Matrix (Free registration required)
Conferences
File Upload Security (February OWASP Meetup) & Updated OWASP File Upload Cheat Sheet
CS3STHLM 2019 #ICS/SCADA
Slides & Workshop material
Tutorials
Medium to advanced
DNS Exfiltration using SQLMap in a Microsoft SQL Environment
PyRDP on Autopilot – Unattended Credential Harvesting and Client-Side File Stealing
Beginners corner
Writeups
Pentest writeups
Responsible(ish) disclosure writeups
The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections & FAQ
CVE-2020-0688: Microsoft Exchange deserialization/RCE vuln #RCE
Cacti v1.2.8 authenticated Remote Code Execution (CVE-2020-8813) #CodeReview #RCE
Cache poisoning DoS in CloudFoundry gorouter (CVE-2020-5401) #Web
Signature Validation Bypass Leading to RCE In Electron-Updater #RCE
[EN] A-Z: GWTUpload – DoS #CodeReview
Bug bounty writeups
Periscope android app deeplink leads to CSRF in follow action (Twitter, $1,540)
Twitter Source Label allow ‘mongolian vowel separator’ U+180E (app name) (Twitter, $560)
Ad Builder Display Ads Path Traversal (SEMrush, $500)
iOS app crashed by specially crafted direct message reactions (Twitter, $560)
Password Reset Link Works Multiple Times (NordVPN, $100)
Long String DoS ($100)
Tools
Progress: Burp Suite extension to track vulnerability assessment progress
1u.ms: A small set of zero-configuration DNS utilities for assisting in detection and exploitation of SSRF-related vulnerabilities
shuffleDNS: Wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support
Jiraffe: One stop place for exploiting Jira instances in your proximity
PassiveHunter: Subdomain discovery using the power of ‘The Rapid7 Project Sonar datasets’
udp-hunter & Introduction: Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols
Weakpass_generator & Weak in, Weak out: Keeping Password Lists Current: Generates weak passwords to try in brute-force attempts, based on current date with a 90 day window.
Misc. pentest & bug bounty resources
Clicker-service: Clicker service docker container that assists in developing intentionally vulnerable web apps that need a user to “click” on malicious payloads
CPR evasion encyclopedia: The Check Point evasion repository
How to Hack Like a GHOST: A detailed account of a breach to remember (Hacking the Planet Book 8): New ebook from the author of How to Hack Like a Pornst*r. Looks interesting!
Challenges
Articles
News
Bug bounty & Pentest news
Duplicates & self-closed reports do not affect reputation on H1 anymore (Retroactive change)
We found 6 critical PayPal vulnerabilities – and PayPal punished us for it
Reports
Vulnerabilities
How one man could have flooded your phone with Microsoft spam
iPhone and iPad apps can snoop on everything you copy to the clipboard& Show me Your Clipboard Data!
WhatsApp, Telegram Group Invite Links Leaked in Public Searches
Checkmarx Research: Smart Vacuum Security Flaws May Leave Users Exposed
Microsoft Exchange Server admins urged to treat crypto key flaw as ‘critical’ (CVE-2020-0688)
Ghostcat bug impacts all Apache Tomcat versions released in the last 13 years (CVE-2020-1938)
LTE vulnerability allows impersonation of other mobile devices
Breaches & Attacks
Ransomware wipes evidence, lets suspected drug dealers walk free
A ‘stalkerware’ app leaked phone data from thousands of victims
The “Cloud Snooper” malware that sneaks into your Linux servers
Clearview AI loses entire database of faceprint-buying clients to hackers & Here’s the File Clearview AI Has Been Keeping on Me, and Probably on You Too
Malicious apps/sites
Other news
Brave Browser Integrates Wayback Machine to View Deleted Web Pages
Report identifies the most dangerous mobile app store on the internet
How a Hacker’s Mom Broke Into a Prison—and the Warden’s Computer
When speakers are all ears: Understanding when smart speakers mistakenly record conversations
SSL/TLS certificate validity chopped down to one year by Apple’s Safari
Meet the white-hat group fighting Emotet, the world’s most dangerous malware
Hiding Windows File Extensions is a Security Risk, Enable Now
Non technical
Congratulations, Cosmin! The world’s seventh million-dollar bug bounty hacker
Todayisnew Crosses $1M in Bounties at h1-415 in San Francisco
Tweeted this week
We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 02/21/2020 to 02/28/2020.
Curated by Pentester Land & Sponsored by Intigriti
You may also like
Intigriti Bug Bytes #220 - January 2025 🚀
January 10, 2025
Intigriti Bug Bytes #219 - December 2024 🎅
December 13, 2024
Bug Bytes #218 – Advent of Cyber, RCEs and hacking poems
December 6, 2023