Thursday, March 1
TOP STORY
Questionable actions by Trustico as the CEO emailed 23K private keys to DigiCert to trigger a compromise - This thread by Geoffrey Thomas is a great recap of the saga, here’s DigiCert’s statement, there’s also this, and finally: 503 service unavailable.
HACKTIVITY
Registration enabled on ███grab.com [22 upvotes] - $1,000 bounty for this report to GrabTaxi by @grouptherapy.
Negative size in tar header causes infinite loop [6 upvotes] - no bounty for this report to RubyGems by @plover
Toyota, Intel, Automattic, Twitter, Yahoo, Snapchat and more paid out bounties in the past 24-hours.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
TWEET OF THE DAY
I must ask you refrain from using hacker characters when engaging with my content. - @megahbite
OTHER ARTICLES WE’RE READING
More on VU#475445, Duo’s Kelby Ludwig discovered SAML vulnerabilities affecting multiple implementations
GitHub victims of memcache DDoS attack “an amplification attack using the memcached-based approach described above that peaked at 1.35Tbps via 126.9 million packets per second.”
Mozilla’s 27,052 voices telling CFPB: do not let Equifax off easy
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: zerodaily@hackerone.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
My this week’s most useless finding: Buffer Overflow in cmd.exe can be used to enable debug mode when more than 256 chars are used (StatementType[] can hold 256 entries, type of ( is 0x33 and therefore enables debug mode. Disable via @ which has type 0x00)
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.