hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
High frequency security bug hunting: 120 days, 120 bugs
shubs
High frequency security bug hunting: 120 days, 120 bugs
1) Intro & Motivations
At the start of of this year, I set myself a personal goal of finding 365 bugs in 365 days.
This was entirely motivated by wanting to challenge myself to find more security issues as I felt I'd been slacking off.
I thought back to…
hack and bug bounty
Using ngrok to proxy internal servers in restrictive environments
shubs
Using ngrok to proxy internal servers in restrictive environments
When gaining shell access to a machine on a network, a promising attack vector is to check the internal network for web applications and services that may be accessible from the machine that has been compromised.
Often, internal web applications are found…
hack and bug bounty
Insecure Features in PDFs
Blogspot
Insecure Features in PDFs
In 2019, we published attacks on PDF Signatures and PDF Encryption . During our research and studying the related work, we discovered a lot...
hack and bug bounty
Single Sign-On Security: Security Analysis of real-life OpenID Connect Implementations
Blogspot
Single Sign-On Security: Security Analysis of real-life OpenID Connect Implementations
This is a guest blogpost by Lauritz Holtmann . He wrote his master thesis: "Single Sign-On Security: Security Analysis of real-life OpenID C...
hack and bug bounty
Shadow Attacks: Hiding and Replacing Content in Signed PDFs
Blogspot
Shadow Attacks: Hiding and Replacing Content in Signed PDFs
Last year we presented How to Spoof PDF Signatures . We showed three different attack classes. In cooperation with the CERT-Bund (BSI)...
hack and bug bounty
CVE-2020-2655 JSSE Client Authentication Bypass
Blogspot
CVE-2020-2655 JSSE Client Authentication Bypass
During our joint research on DTLS state machines, we discovered a really interesting vulnerability (CVE-2020-2655) in the recent versions...
hack and bug bounty
CTF: FluxFingers4Future - Evil Corp Solution
Blogspot
CTF: FluxFingers4Future - Evil Corp Solution
For this years hack.lu CTF I felt like creating a challenge. Since I work a lot with TLS it was only natural for me to create a TLS challen...
hack and bug bounty
PDFex: Major Security Flaws in PDF Encryption
Blogspot
PDFex: Major Security Flaws in PDF Encryption
After investigating the security of PDF signatures , we had a deeper look at PDF encryption. In cooperation with our friends from Mün...
hack and bug bounty
Testing SAML Endpoints for XML Signature Wrapping Vulnerabilities
Blogspot
Testing SAML Endpoints for XML Signature Wrapping Vulnerabilities
A lot can go wrong when validating SAML messages . When auditing SAML endpoints, it's important to look out for vulnerabilities in the sign...
hack and bug bounty
Probing for XML Encryption Weaknesses in SAML with EsPReSSO
Blogspot
Probing for XML Encryption Weaknesses in SAML with EsPReSSO
Security Assertion Markup Language (SAML) is an XML-based standard commonly used in Web Single Sign-On (SSO) [1]. In SAML, the confidential...
hack and bug bounty
Scanning TLS Server Configurations with Burp Suite
Blogspot
Scanning TLS Server Configurations with Burp Suite
In this post, we present our new Burp Suite extension "TLS-Attacker". Using this extension penetration testers and security researchers ca...
hack and bug bounty
Why Receipt Notifications increase Security in Signal
Blogspot
Why Receipt Notifications increase Security in Signal
This blog post is aimed to express and explain my surprise about Signal being more secure than I thought (due to receipt acknowledgments). ...
hack and bug bounty
Scanning for Padding Oracles
Blogspot
Scanning for Padding Oracles
As you might have heard, we recently got our paper on padding oracle attacks accepted to the USENIX Security Conference. In this paper, we ...
hack and bug bounty
Playing with TLS-Attacker
Blogspot
Playing with TLS-Attacker
In the last two years, we changed the TLS-Attacker Project quite a lot but kept silent about most changes we implemented. Since we do not h...
hack and bug bounty
How To Spoof PDF Signatures
Blogspot
How To Spoof PDF Signatures
One year ago, we received a contract as a PDF file. It was digitally signed. We looked at the document - ignoring the "certificate is not tr...
hack and bug bounty
Practical Bleichenbacher Attacks on IPsec IKE
Blogspot
Practical Bleichenbacher Attacks on IPsec IKE
We found out that reusing a key pair across different versions and modes of IPsec IKE can lead to cross-protocol authentication bypasses, e...
hack and bug bounty
Practical Dictionary Attack on IPsec IKE
Blogspot
Practical Dictionary Attack on IPsec IKE
We found out that in contrast to public knowledge, the Pre-Shared Key (PSK) authentication method in main mode of IKEv1 is susceptible to o...
hack and bug bounty
Real World Bug Hunting: Information Disclosure in Error Messages
Medium
Real World Bug Hunting: Information Disclosure in Error Messages
Hunting for bugs doesn’t have to be complex. This is a quick but informative story of how we found a vulnerability under 5 minutes on a…
hack and bug bounty
Pros and cons of clustering AppSec tooling
Medium
Pros and cons of clustering AppSec tooling
Clustering of Application Security tooling refers to the use of multiple tools and techniques to improve the security of an application…
hack and bug bounty
Agent-Server Authentication Design Pattern
Medium
Agent-Server Authentication Design Pattern
I have come across many agent based distributed systems like OEM, AV solutions and Splunk which need to communicate with a centralized server. This communication is often sensitive, carrying data…