ZERO DAILY
Hacking, AppSec, and Bug Bounty newsletter
2017-12-18 | Fox IT’s MitM learnings, Math as Code, and Network pivoting techniques
Monday, December 18
TOP STORY
-
Lessons learned from a Man-in-the-Middle attack. Fox IT published their IR plan and timeline of a MitM attack from September. Lessons learned and recommendations included. Don’t always ignore the regular “background noise on the internet”.
HACKTIVITY
-
Cross-origin resource sharing misconfig | steal user information [33 upvotes] - $1,000 bounty for this report to SEMRush from @bughunterboy.
-
X-XSS-Protection -> Misconfiguration [4 upvotes] - no bounty for this report to the U.S. Department of Defense
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
OTHER ARTICLES WE’RE READING
-
Invoke-PSImage - Embed PowerShell payloads in the pixels of images and generate oneliners to execute
-
Math as Code: Cheat sheet for mathematical notation in code form
-
Network pivoting techniques by Bit Rot
-
The nutty math that really shows how quickly bitcoin has grown and BTC futures are now on the CME
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: zerodaily@hackerone.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The twin mantras in security should always be followed: layered security; and prevention, detection and response. At the time that ‘if’ becomes ‘when’, it is the combination of these that ultimately determines your overall resilience and cybersecurity stance.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.