3 min read

👩‍💻IW Weekly #35: HTTP Desync Attack, Mass Account Takeover, SSRF via DNS Rebinding, Exploiting CORS Misconfigurations, Hacking APIs, and much more…

👩‍💻IW Weekly #35: HTTP Desync Attack, Mass Account Takeover, SSRF via DNS Rebinding, Exploiting CORS Misconfigurations, Hacking APIs, and much more…
Photo by Mika Baumeister / Unsplash

@hacker_ hacked a phone company and viewed the call logs of 50M customers. Here's how he did it.

Welcome to the #IWWeekly35 - the Monday newsletter that brings the best in Infosec straight to your inbox.

IWCON2022’s countdown has now started!

Barely 20 days are left for the world's largest virtual cybersecurity conference and networking event 😍🙌

Are you excited? Let us know on Twitter @InfoSecComm 🙂

If you haven’t booked your ticket yet, get it here. We’re selling out fast.

With 20+ hours of learnings, QnA and networking, this conference would bring a huge jump in your infosec career.

Now, coming back to today's NL, here are our top picks for this week: 7 articles, 6 Threads, 5 videos, 2 GitHub repos and tools, 1 job alert to help you maximize the benefit from this newsletter and take a massive jump ahead in your career.

Excited? Let’s jump in👇

📝 7 Infosec Articles (5+ 2 beginner-friendly)

#1 @AnkitCuriosity shared an in-depth article on HTTP Desync Attack (Request Smuggling) - Mass Account Takeover at a Cryptocurrency based asset and 121 other websites.

#2 In this article by 0xacb, learn about how to fuzz the web for mysterious bugs.

#3  basu_banakar shared his methods on SSRF via DNS Rebinding (CVE-2022–4096).

#4 Learn how to exploit CORS Misconfigurations here.

#5 From Zero to Hero Part 1: Bypassing Intel DCM’s Authentication by Spoofing Kerberos and LDAP Responses (CVE-2022-33942) by @MrTuxracer.

Beginner-friendly -

#1 Read this article to find how @0xM5awy found 8 vulnerabilities in 24 hours.

#2 Shubham Shah has shared his entire roadmap of getting into bug bounties. Read it here.

#1 @hacker_ hacked a phone company and viewed the call logs of 50M customers. Here's how he did it.

#2 @Steiner254 shared amazing tips and references for hitting P1's - RCE, SQL injection, SSRF, stored XSS, LFI, XXE, IDOR e.t.c.

#3 @maikroservice shares the roadmap for how to get ready for your (next) job as a SOC analyst.

#4 Do you want to know how the Windows event log system works? Then read this detailed thread by @maikroservice.

Beginner-friendly -

#1 @Steiner254 shares the best tips and tricks on hacking APIs.

#2 @optionalctf talks about common CSRF exploits and some bypasses for existing security measures.

📽️ 5 Insightful Videos (3 + 2 beginner-friendly)

#1 @I_Am_Jakoby demonstrates a great technique to bypass constraints on powershell using NsLookup to perform scripts using DNS txt records. This technique was originally shared by @Alh4zr3d.

#2 Identification and authentication failures ranks 7th on the OWASP top 10. Checkout @CristiVlad25’s video on some ways to bypass authentication.

#3 Watch @Gregxsunday’s extremely resourceful livestream where he shares his most important security lessons of 2022.

Beginner-friendly -

#1 @PhD_Security solves a lab on server-side template injection while sharing some resources related to it.

#2 Learn how to steal arbitrary files from LocalStorage in Android from this interview between @AseemShrey and @hax0rgb.

⚒️ 2 GitHub repositories & Tools

#1 REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications by @0xacb.

#2 ReconX is an automated recon tool for bug bounty hunting by @YazeedOliwah.



💰1 Job Alert

#1 PwC India is looking for individuals who have experience in VAPT, Application Security Assessments, Mobile App Security Assessments.

💸Advertise with us💸

We are looking to partner with amazing infosec, pen testing, and ethical hacking teams, brands, and companies from all over the world. If this sounds like you, click here to partner with us.

—----------------------------------------------------------------------------------


That’s all for this week. Hope you enjoyed these incredible finds and learned something new from today’s newsletter.

Before we say bye…

If you found this newsletter interesting, and know other people who would too, we'd really appreciate if you could forward it to them 📨

If you have questions, comments, or feedback, just reply to this email or let us know on Twitter @InfoSecComm.

See you again next week.

Lots of love

Editorial team,

Infosec Writeups

This newsletter has been created in collaboration with our amazing ambassadors.

Resource contribution by: Ayush Singh, Hardik Singh, Nikhil A Memane, Bhavesh Harmalkar, Mohit Khemchandani, Vinay Kumar, and Tuhin Bose.


Newsletter formatting by: Hardik Singh, Vinay Kumar, Siddharth and Ayush Singh.