Hacking, AppSec, and Bug Bounty newsletter
2018-03-01 | Trustico SSL cert saga, Duo’s SAML vulnerability research, and Mozilla doesn’t want Equifax to get off easy
Thursday, March 1
Questionable actions by Trustico as the CEO emailed 23K private keys to DigiCert to trigger a compromise - This thread by Geoffrey Thomas is a great recap of the saga, here’s DigiCert’s statement, there’s also this, and finally: 503 service unavailable.
Registration enabled on ███grab.com [22 upvotes] - $1,000 bounty for this report to GrabTaxi by @grouptherapy.
Negative size in tar header causes infinite loop [6 upvotes] - no bounty for this report to RubyGems by @plover
Toyota, Intel, Automattic, Twitter, Yahoo, Snapchat and more paid out bounties in the past 24-hours.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
TWEET OF THE DAY
I must ask you refrain from using hacker characters when engaging with my content. - @megahbite
OTHER ARTICLES WE’RE READING
GitHub victims of memcache DDoS attack “an amplification attack using the memcached-based approach described above that peaked at 1.35Tbps via 126.9 million packets per second.”
Mozilla’s 27,052 voices telling CFPB: do not let Equifax off easy
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: firstname.lastname@example.org
Get this email forwarded to you? Click here to subscribe to the Zero Daily
My this week’s most useless finding: Buffer Overflow in cmd.exe can be used to enable debug mode when more than 256 chars are used (StatementType can hold 256 entries, type of ( is 0x33 and therefore enables debug mode. Disable via @ which has type 0x00)