Collaboration and knowledge sharing are important in cybersecurity.
.NET remoting can be exploited to leak object references.
Focusing on simplicity in hacking methodologies leads to impactful results.
Deep dives
Exploring the New Features in Project Discovery Version 3.2
Project Discovery has released version 3.2 with features like authenticated scanning and expanded fuzzing support. Authenticated scanning allows automatic authentication into applications with built-in login templates or custom ones. Fuzzing support now covers query parameters, headers, cookies, and more.
Innovative Phone Automation Through Disassembling and Repurposing Phones
A new phone automation method involves disassembling phones, unscrewing main boards, connecting them to a special PCB, and mounting them inside a server case. This setup allows multiple phones to run from one source, controlled by a computer, enhancing efficiency and automation capabilities for various tasks.
Exploiting Vulnerabilities and Botting Strategies in Security Testing
Discussion delves into parallels between botting and security mindsets, emphasizing the similarity in problem-solving approaches. The conversation highlights the cat-and-mouse game in security testing, noting the challenges faced by both attackers and security teams. Insights are shared on the skill sets shared between botting and security, illustrating transitions between these fields in the cybersecurity industry.
Simplicity in Hacking Approach
Focusing on simplicity in hacking methodologies can lead to more impactful results. Understanding the basics of a target, such as identifying assets, APIs, and exploring the business logic within the main application, can uncover vulnerabilities effectively. By keeping the approach straightforward and concentrating on the fundamentals, hackers can navigate through recon and exploit different aspects with clarity, enhancing the overall outcomes.
Reconnaissance and Application Level Exploitation
Reconnaissance varies between wide-scale recon for finding assets and specific recon for exploiting vulnerabilities within applications. While wide-scale recon involves discovering unique services and configurations outside the main app, specific recon delves into exploiting vulnerabilities within the core application and its functionalities like XSS or ATO. Each approach offers distinct challenges and rewards, emphasizing the importance of understanding the target thoroughly for successful hacking endeavors.
Episode 64: In this episode of Critical Thinking - Bug Bounty Podcast we talk about Justin and Joel delve into .NET remoting and how it can be exploited, a recent bypass in the Dom Purify library and some interesting functionality in the Cloudflare CDN-CGI endpoint. They also touch on the importance of collaboration and knowledge sharing, JavaScript Deobfuscation, the value of impactful POCs, hiding XSS payloads with URL path updates.
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
Check out Project Discovery’s nuclei 3.2 release blog at nux.gg/podcast