If you regularly monitor bug bounty reports, you’ve seen “JavaScript prototype pollution” titles. Nikita Stupin decided to dig deeper into the category of vulnerabilities, impacting JavaScript applications, and prepared the practical guide of its discovery and exploitation. Soon we will also prepare an English version of the paper, but currently, you have to manage by yourself to translate it.
bug bounty
For everyone who wants to start new year productively and begin the journey in #AppSec, I'll introduce “Web App Bug Hunting: Fundamentals and Learning Path” workshop on #SINCON. Thanks to @dariaski and @Emil0xA for the opportunity. Workshop details: https://t.co/sEpB73RvTh https://t.co/nIoKt2JmCv
— Denis Makrushin (@makrushind) January 2, 2021
For everyone who wants to start the new year productively and begin the journey in application security, I will introduce “Web Applications Bug Hunting: Fundamentals and Learning Path” workshop on SINCON.
Once bug hunting becomes a race of known misconfigurations and CVE detection, automation is required:
- monitor daily #BugBountyTips and CVEs;
- filter results with trendy potential;
- get alerts on time (13:37 UTC +0).
“Bug Hunting Hub” is a Telegram channel with my notes and bot notifications.
Are you planning to get into application security, but don’t know where to start? Today at #TheSASonline workshop I will introduce the fundamentals of web-applications vulnerability research. We will start from the basic, but important techniques to gradually build-up to the level where attendees can not only use the tactics, techniques, and tools to assess various components involved in bug hunting but also walk away with a solid understanding of the concepts on which these tools work. And you will get a roadmap to your first bug.
Information and registration: https://www.securityweek.com/kaspersky-and-securityweek-present-sashome-virtual-event-security-analyst-summit
Earlier, I’ve already published information about the critical vulnerabilities and backdoors in D-Link DIR-620 (RevG), that I’ve discovered and submitted to the vendor. The D-Link DIR-620 routers is a model of router, that popular in Russia and CIS countries (most home routers are located behind their ISP’s NAT, which is why these routers don’t appear in the statistics) due to one of the ISPs delivered to its customers (this conclusion is based on the fact that the router is provided as part of the standard customer contract and the hardcoded credentials contain the name of the ISP in the login string).