Hacking, AppSec, and Bug Bounty newsletter
2017-05-10 | Snail mail 2fa, CVE-2017–2448, and Ask Eugene
Wednesday, May 10
Have a great day!
Feature abuse > memory exploits and more in Abusing DNSAdmins privilege for escalation in Active Directory. Always cool to see the collaboration and sharing of knowledge with notes like “UPDATE: Benjamin confirmed that it is possible to load the DLL from UNC path. The 'C$' in my UNC path was the problem!” Hack the planet.
[platform.harvestapp.com] Reflected XSS in Error Message via URL parameters [8 upvotes] - $300 bounty for this report to Harvest by @ysx. The Harvest Timer was vulnerable to reflected XSS via unsanitised HTML in an invalid namespace error message
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity.
OTHER ARTICLES WE’RE READING
CVE-2017–2448 - iCloud keychain and the OTR vulnerability
Snail mail 2fa and stronger authentication at SA.GOV
Ask Eugene - Thursday, 9am EDT
Trump says Comey isn’t his homey.
How much did ransomware cost in 2016? At least $1B says latest PandaLabs report
What we’re talking about in the #slack water cooler at H1: Yesterday, had a healthy discussion on this WSJ article: Why You Can’t Concentrate at Work. Can anyone relate?
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty solutions encompass vulnerability assessment, crowdsourced security testing and responsible disclosure management. Discover more about our hacker powered security testing solutions or Contact Us today.