Tuesday, January 30
TOP STORY
The Strava heatmap can be deanonymyzed. Steve Loughran published research: Advanced Denanonymization through Strava. The tl;dr from Wired: The data can be de-anonymised, including names and running routes of people at high-security military facilities. A quick search shows the names of 50 US personnel at a base in Afghanistan.
HACKTIVITY
Markdown parsing issue enables insertion of malicious tags and event handlers [101 upvotes] - $5,000 bounty for this report to HackerOne by @ahmed_anwer_mohamed.
Domain spoofing in redirect page using RTLO [24 upvotes] - $500 bounty for this report to HackerOne by @ashishpadelkar.
Humble pie tastes so good.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
TWEET OF THE DAY
Android Hackers! For that quick Screenshot PoC you need:
adb shell screencap -p /sdcard/poc.png && adb pull /sdcard/poc.png
will create a Screenshot & download it to your home folder :-) - @itsecurityguard
OTHER ARTICLES WE’RE READING
Cisco adaptive security appliance RCE and denial of service vulnerability
appriver’s global security report for 2017 (yes, another one)
XSS Cheat Sheet, 2018 edition by Brute Logic
Tip for Android hacker’s to capture PoC’s
Staying secure and getting pwned, podcast interview with Troy Hunt
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: zerodaily@hackerone.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The underlying problem is that the devices we wear, carry and drive are now continually reporting information about where and how they are used 'somewhere’.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.