Hacking, AppSec, and Bug Bounty newsletter
2018-05-01 | Anatomy of account takeover attacks, The Dstruction20 CTF at DEFCON, and US Senators chide CFPB on Equifax breach inaction
Tuesday, May 1
Distil Networks report: The Anatomy of Account Takeover Attacks on how attackers use bots to test stolen usernames and passwords on websites. Distil evaluated data from 600 domains that include login pages, then analyzed a subset of 100 having the largest bad bot traffic datasets. 100% of websites with login pages face regular attacks and after a major breach, activity increases 3x.
`superstatic` is vulnerable to path traversal on Windows [5 upvotes] - no bounty for this report to Node.js third-party modules by @chalker.
Client-side Template Injection in Search, user email/token leak and maybe sandbox escape [5 upvotes] - $500 bounty for this report to Rockstar Games by @europa.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
TWEET OF THE DAY
I'm running a CTF at @defcon this year where your hacking rig must cost under $200, and every 15 minutes, a random contestant is chosen to have their machine damaged (usually physically) in a way chosen by rolling a d20: The D(struction)20 CTF! - @dan_crowley
OTHER ARTICLES WE’RE READING
NIST published an updated version 1.1 of the Framework for Improving Critical Infrastructure Cybersecurity.
Equifax breach: US Senators Warren, Schatz, and Menendez co-authored a 10-page report claiming lack of action at the Consumer Financial Protection Bureau related to the over 20,000 Equifax related complaints submitted to the CFPB.
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
The legislation was inspired, oddly enough, by the 1983 film “WarGames.” … Ronald Reagan saw the film and was terrified, as were other politicians, who vowed to act.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.