Hacking, AppSec, and Bug Bounty newsletter
2018-05-21 | Extracting SSH private keys from Windows 10 ssh-agent, Spoofing SIM cards to steal $150K worth of cryptocurrency, and Fortinet’s wicked family of bots
Monday, May 21
Extracting SSH Private Keys from Windows 10 ssh-agent by Ronnie Flathers, aka @ropnop. TL;DR: Private keys are protected with DPAPI and stored in the HKCU registry hive. Ronnie released some PoC code in the blog to extract and reconstruct the RSA private key from the registry.
CVE-2018-6797: A crafted regular expression can cause a heap buffer write overflow in Perl 5 giving a remote attacker control over bytes written [18 upvotes] - $1,000 bounty for this report to Perl (Internet Bug Bounty) by @geeknik.
ACME TLS-SNI-01/02 challenge vulnerable when combined with shared hosting providers [28 upvotes] - no bounty for this report to The Internet by @fransrosen.
You can see all the latest and greatest disclosures and bounties on www.hackerone.com/hacktivity
TWEET OF THE DAY
By age 35, you should have executed 'rm -rf' against the wrong directory at least once. - @mackwage
OTHER ARTICLES WE’RE READING
Fortinet published research on several mirai botnet variants dubbed “A Wicked Family of Bots”.
Saturday was the 20th anniversary of L0pht’s testimony on Capitol Hill. They’re doing a reprisal tomorrow for the Congressional Internet Caucus Academy, if you’re in the DC area.
The Commissioner for EU Justice tweeted that “So far only 4 (out of 28) EU countries have adopted national laws implementing the #GDPR.”
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
Understanding the basics of this technique, the audience won't be surprised to know that more than 10 vulnerabilities have been found in sophisticated frameworks and multi-layered web architectures aforementioned via this technique.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.