👩‍💻IW Weekly #104: ClickHouse, Velociraptor, WAF bypass techniques, Path Traversal Vulnerabilities, io_uring Vulnerability in Ubuntu, Shockwave Attack Surface Management, .NET Remoting Exploits, Github dorks and many more…

👩‍💻IW Weekly #104: ClickHouse, Velociraptor, WAF bypass techniques, Path Traversal Vulnerabilities, io_uring Vulnerability in Ubuntu, Shockwave Attack Surface Management, .NET Remoting Exploits, Github dorks and many more…
Photo by RoonZ nl / Unsplash

Welcome to the #IWWeekly93 - the Monday newsletter that brings the best in Infosec straight to your inbox.

To help you out, we have 5 Articles, 4 Threads, 3 Videos, 2 Job Alerts and a Special Item 🫢

Read, upskill yourself and spread love to the community 💝

Excited? Let’s jump in 👇

📝 5 Infosec Articles

  1. An article about Runreveal's discovery of a Role-Based Authentication Bypass in ClickHouse versions up to v23.1, resulting in CVE-2024-22412.
  2. Explore XSS, Prototype Poisoning, and Unicode Case Mapping Collision in Intigriti's March 2024 Challenge, created by m0z.
  3. Discover the new .NET Remote Code Execution method, CVE-2024-29059, unveiled by Code White, exploiting HTTP .NET Remoting through leaked ObjRefs.
  4. Dive into CVE-2024-0582, the use-after-free vulnerability in Linux's io_uring, which stayed unpatched in Ubuntu, presenting a 0day threat for over two months.
  5. Learn about the nuances of aggressive scanning in bug bounty programs and find effective strategies to evade it, authored by @_CryptoCat.
  1. Learn advanced WAF bypass techniques like rewriting payloads, benchmarking and obfuscating SQL injections with @intigriti insightful guide.
  2. Explore the Cyberchef by @GCHQ for effortless encoding/decoding, encryption/decryption, and data analysis by @intigriti
  3. Unlock the potential of GitHub dorks with @thebinarybot, and discover how these advanced search queries can lead to valuable bounties. 
  4. Unveil the dangers of path traversal vulnerabilities with @thebinarybot, and learn how attackers can exploit weak file path handling in applications. 

📽️ 3 Insightful Videos

  1. @NahamSec hosts a Bug Bounty legend Jason Hadex in his latest video, revealing how Jason scored $220,000 hacking a prison.  
  2. Explore .NET remoting exploits, Dom Purify bypasses, and Cloudflare CDN-CGI features on @criticalthinkingpodcast latest episode, promoting community collaboration.
  3. @NahamSec shares insights in his latest video from a Discord server selling RedLine InfoStealer, highlighting the dangers of malware distribution and emphasizing caution. 

💼 2 Job Alerts

  1. Cure53 is hiring an editor to refine 60-120 pages weekly, offering competitive pay with NDA and GDPR adherence required.
  2. The Pokémon Company International is hiring a Cloud Information Security Engineer to develop and implement security controls and defenses.

🎁 1 Special Item

  1. Learn cybersecurity with YesWeHack's DOJO: hands-on modules and a playground for real-world security challenges.

Watch “Learnings from scanning 2 million hosts daily for bug bounty” by Dawid Moczadło at IWCON2023


That’s all for this week. Hope you enjoyed these incredible finds and learned something new from today’s newsletter. Meet you again next week hacker, until then keep pushing 💪

This newsletter would not have been made possible without our amazing ambassadors.

Resource contribution by: Nikhil A Memane, Hardik Singh, Ayush Singh, Manan
Newsletter formatting by: Hardik Singh, Ayush Singh, Nithin R, Rachit Arora, AnuPallavi

Lots of love
Editorial team,

Infosec Writeups

📧
If you have questions, comments, or feedback reach out to us on Twitter @InfoSecComm or email [email protected]

Subscribe to The Infosec Newsletter

Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
[email protected]
Subscribe