Hey hackers! These are our favorite resources shared by pentesters and bug hunters last week.

This issue covers the week from 21 to 28 of February.

Our favorite 5 hacking items

1. Conference of the week

So many good talks and prestigious speakers! Topics range from Web security to Cloud, Kubernetes, Credential stuffing, DevSecOps, Car hacking and more.

I’m starting with JWT Parkour - Louis Nyffenegger and Are You Properly Using JWTs? - Dmitry Sotnikov. What about you?

2. Writeup of the week

This is a writeup of an interesting bug found by analyzing a file upload functionality. It used AWS for storing documents uploaded, and AWS signing to authorize access to files.

By manipulating a request parameter, @ozgur_bbh was able to bypass the signing mechanism and access all documents in the S3 bucket.

3. Videos of the week

I don’t think I will ever get bored of watching interviews with hackers. This one is with @zlz. It is fascinating to learn about his thought process, his unique recon process, how he approaches full-time bug hunting, how he is able to get a sense of applications that are probably vulnerable based on past experience, etc.

The second video may be the fastest way to learn how to use Firefox Containers. They are very useful for both Web hacking (IDOR and authorization tests) and segregating accounts during normal navigation.

4. Article of the week

This in an interesting read for anyone interested in doing research and submitting new modules to Detectify. @gehaxelt explains his process for analyzing the most popular Wordpress plugins and finding information leaks.

5. Tutorial of the week

This tutorial might be helpful if you are struggling with certificate pinning bypass. @CaptMeelo shows a nice trick he used when Xposed Modules and Frida were not working.

He looked at the system log while the app was running. Certificate fingerprints appeared in the log. He decompiled the app, identified where the fingerprints were located and added one for his Burp certificate. Recompiling the app and running this patched version allowed him to bypass certificate pinning without having to modify smali code.

Other amazing things we stumbled upon this week

Videos

Podcasts

Webinars & Webcasts

Adversary Emulation and the C2 Matrix (Free registration required)

Conferences

Slides & Workshop material

Tutorials

Medium to advanced

Beginners corner

Writeups

Pentest writeups

Responsible(ish) disclosure writeups

Bug bounty writeups

See more writeups on The list of bug bounty writeups.

Misc. pentest & bug bounty resources

Challenges

Articles

News

Bug bounty & Pentest news

Reports

Vulnerabilities

Breaches & Attacks

Malicious apps/sites

Other news

Non technical

Tweeted this week

We created a collection of our favorite pentest & bug bounty related tweets shared this past week. You’re welcome to read them directly on Twitter: Tweets from 02/21/2020 to 02/28/2020.

Curated by Pentester Land & Sponsored by Intigriti

Have a nice week folks!

If you want to be notified when new articles (including this newsletter) are published, you can subscribe to this blog.

And if you enjoyed reading this, please consider sharing it, leaving a comment, suggestions, questions…