Hacking, AppSec, and Bug Bounty newsletter
2017-12-18 | Fox IT’s MitM learnings, Math as Code, and Network pivoting techniques
Monday, December 18
Lessons learned from a Man-in-the-Middle attack. Fox IT published their IR plan and timeline of a MitM attack from September. Lessons learned and recommendations included. Don’t always ignore the regular “background noise on the internet”.
Cross-origin resource sharing misconfig | steal user information [33 upvotes] - $1,000 bounty for this report to SEMRush from @bughunterboy.
X-XSS-Protection -> Misconfiguration [4 upvotes] - no bounty for this report to the U.S. Department of Defense
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
OTHER ARTICLES WE’RE READING
Invoke-PSImage - Embed PowerShell payloads in the pixels of images and generate oneliners to execute
Math as Code: Cheat sheet for mathematical notation in code form
Network pivoting techniques by Bit Rot
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The twin mantras in security should always be followed: layered security; and prevention, detection and response. At the time that ‘if’ becomes ‘when’, it is the combination of these that ultimately determines your overall resilience and cybersecurity stance.