Hacking, AppSec, and Bug Bounty newsletter
2017-11-27 | Why security is hard, Recon.sh, and Imgur’s speedy breach response time
Monday, November 27
AI. Machine Learning. Buzzword. Bingo…Or so we say now. A group of ASU researchers claims that they can predict which vulnerabilities will actually be used for breaches through their model. And if this sounds familiar, see @mroytman’s O’Reilly Security talk on predicting exploitability which we shared here a while back. Also, Dan Miessler believes we’ll see AI in security ops centers sooner rather than later. What do you believe?
Privilege Escalation using API->Feature [16 upvotes] - $1,500 bounty for this report to Ubuquiti Networks by @hacknroll.
Server-side cache poisoning leads to the http://my.dev.owox.com inaccessibility [12 upvotes] - no bounty for this report to OWOX Inc by @sp1d3rs.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
TWEET OF THE DAY
This is a great RCE find. Also good example of why security is hard. This highlights third party packages, whitelist vs. blacklist, and trying to anticipate all possible use cases (not trivial) - @wh33lhouse
OTHER ARTICLES WE’RE READING
The New Yorker investigates Berkeley’s future hunters
recon.sh: Never lose your recon data again. Track and organize in a git repo.
Wired loves Firefox Quantum
Scott Piper bids adieu to the weekly Downclimb. His insights will be missed.
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The standard for AI to become useful (and therefore prolific) within InfoSec is not being better than humans—it’s being able to do just about anything at all.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.