Thursday, July 27
See you at DEF CON and Black Hat!
TOP STORY
A few IoT hack nuggets from Black Hat. Here’s 7 Hardware & Firmware Hacks at Black Hat 2017 including how to hack into hardware with a $10 SD card reader. There’s also the car wash hack that can trap you inside it, which the researchers believe believe it is the first exploit of a connected device that causes the device to physically attack someone. And, hack the wind - turbines that is.
HACKTIVITY
XXE on sms-be-vip.twitter.com in SXMP Processor [106 upvotes] - $10,080 bounty for this report to Twittery by @joshbrodienz. XXE vulnerability in the cloudhopper sxmp servlet.
Reflected XSS at https://da.wordpress.org/themes/?s= via "s=" parameter [13 upvotes] - $387.50 bounty for this report to WordPress by @jon_bottarini.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
TWEET OF THE DAY
The research and evil just dropped by @harmj0y and @_wald0 from @SpecterOps is the greatest thing I have personally seen in security to date. - @tyler_robinson (Bloodhound 1.3)
OTHER ARTICLES WE’RE READING
#fransvisitsvegas [live workshop recording]
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: zerodaily@hackerone.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
Microsoft strongly believes in the value of the bug bounties, and we trust that it serves to enhance our security capabilities
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.