👩‍💻IW Weekly #51: Server-Side prototype pollution, Pentest mapper, SSRF in Meta, Hacking CI/CD pipelines, AWSScrape, Hacking Android, SQL Injections and much more…

👩‍💻IW Weekly #51: Server-Side prototype pollution, Pentest mapper, SSRF in Meta, Hacking CI/CD pipelines, AWSScrape, Hacking Android, SQL Injections and much more…
Photo by FLY:D / Unsplash


@PortSwigger released a tool for finding server-side prototype pollution bugs and here’s all you need to know about it.

Welcome to the #IWWeekly51 - the Monday newsletter that brings the best in Infosec straight to your inbox.

To help you out, we have 5 Articles, 4 Threads, 3 Videos, 2 GitHub Repos and Tools, 1 Job Alert in today’s newsletter. We also have a Beginner's Corner featured in this edition.

Read, upskill yourself and spread love to the community 💝

Excited? Let’s jump in 👇

📝 5 Infosec Articles

  1. @PortSwigger released a tool for finding server-side prototype pollution bugs and here’s all you need to know about it.
  2. @payatulabs published a detailed article on how one can utilize BurpSuite’s pentest mapper plugin to the fullest.
  3. @SMHTahsin33 wrote an interesting article on bypassing character limit to obtain an XSS using spanned payload.
  4. @SirBagoza wrote an article on how he was able to get easy $$$ by abusing API params which ultimately lead to bypassing the email verification block.
  5. Curious to know what’s changed in the OWASP API Top 10 2023 edition compared to 2019? Checkout this well written article by @aktodotio.
  1. @MeAsHacker_HNA shares how reading robots.txt file got him 4 XSS reports.
  2. Like ChatGPT, we have our own SecGPT. Find out what @CristiVlad25 has to say about it.
  3. @kannthu1 has revealed how he was able to get a 5.5K$ bounty for finding SSRF in Meta a year ago.
  4. @CristiVlad25 has written a thread on how httpaccess rules can be bypassed.

📽️ 3 Insightful Videos

  1. Ever heard about CI/CD? Learn how to go about hacking CI/CD pipelines by @_JohnHammond. 
  2. Nuclei with all its options could become tedious to add the flags again and again, learn how to write a configuration file for nuclei, by @pdiscoveryio.
  3. @Rhynorater and @0xteknogeek talk about how CVSS could be flawed in some scenarios and how one could make the most out of it, also discussed were bugs like web cache deception and SSTI on the latest episode of critical thinking podcast.

⚒️ 2 GitHub repositories & Tools

  1. AWSScrape is a tool designed to scrape SSL certificates from all AWS IP ranges, it searches for specific keywords like Common Name (CN), Organization (O), etc. in the certificate, by @Jhaddix.
  2. Filter URLs according to the scope using scopy, a python tool, by @manash036.

💰1 Job Alert

  1. HackerOne has a remote position open for a Security Analyst in India.

📝 3 Infosec Articles

  1. Learn how to pentest android applications with @mk2011sharma.
  2. Learn how to effectively perform host and port discovery using tools from @pdiscoveryio’s arsenal of tools.
  3. iOS testing has certain barriers to entry compared to its web and android counterparts which makes it a less looked at area. Learn about the same from this article by @livelession.
  1. A detailed thread on understanding SQL injections by @PadhiyarRushi.
  2. Learn different techniques to exhaustively test XSS on a file upload feature from this thread by @thebinarybot.

📽️ 1 Insightful Video

  1. The most commonly asked question - “Does cybersecurity require coding” answered by @nahamsec

House of Hackers (HoH) is your one-stop forum to discuss all things Cybersecurity. Visit HoH here: https://houseofhackers.xyz/

That’s all for this week. Hope you enjoyed these incredible finds and learned something new from today’s newsletter. Meet you again next week hacker, until then keep pushing 💪

This newsletter would not have been made possible without our amazing ambassadors.

Resource contribution by: Nikhil A Memane, Siddharth, Ayush Singh, Bhavesh Harmalkar, Nithin R, Tuhin Bose, Manan.
Newsletter formatting by: Hardik Singh, Siddharth and Nithin R.

Lots of love
Editorial team,
Infosec Writeups

📧
If you have questions, comments, or feedback reach out to us on Twitter @InfoSecComm or email [email protected]

Subscribe to The Infosec Newsletter

Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
[email protected]
Subscribe