Monday, December 18
TOP STORY
Lessons learned from a Man-in-the-Middle attack. Fox IT published their IR plan and timeline of a MitM attack from September. Lessons learned and recommendations included. Don’t always ignore the regular “background noise on the internet”.
HACKTIVITY
Cross-origin resource sharing misconfig | steal user information [33 upvotes] - $1,000 bounty for this report to SEMRush from @bughunterboy.
X-XSS-Protection -> Misconfiguration [4 upvotes] - no bounty for this report to the U.S. Department of Defense
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
OTHER ARTICLES WE’RE READING
Invoke-PSImage - Embed PowerShell payloads in the pixels of images and generate oneliners to execute
Math as Code: Cheat sheet for mathematical notation in code form
Network pivoting techniques by Bit Rot
The nutty math that really shows how quickly bitcoin has grown and BTC futures are now on the CME
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: zerodaily@hackerone.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The twin mantras in security should always be followed: layered security; and prevention, detection and response. At the time that ‘if’ becomes ‘when’, it is the combination of these that ultimately determines your overall resilience and cybersecurity stance.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.