Bug Bytes #167 – AWS RDS Local File Read & Are you making these learning mistakes or misusing Burp’s predefined lists?
By Anna Hammond
April 13, 2022
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.
This issue covers the week from April 4 to 11.
Our favorite 5 hacking items
1. Conference of the week
How to Get Better at Hacking | Louis Nyffenegger
This isn’t one of @snyff‘s usual technical talks, but I found it is hilarious and eye-opening. He points out many mistakes that (aspiring) hackers make in their learning journey.
If you are struggling with a plateau or just want to grow your hacking skills from good to amazing, there is probably something mentioned in this talk that will help you out.
2. Writeup of the week
AWS RDS Vulnerability Leads to AWS Internal Service Credentials (Amazon)
@LightspinTech‘s director of security research, @gafnitav discovered a Local File Read on AWS RDS. It involves an interesting mix of path traversal and PostgreSQL injection.
A great writeup that details the whole thought process including what did not work.
3. Resource of the week
In addition to the previous writeup, @LightspinTech also released recon.cloud, a free search engine for AWS cloud assets.
It references 220,866 assets, and can be a good addition to your recon.
If you are interested in cloud hacking or Kubernetes security, I also recommend following @LightspinTech’s Twitter account and blog. They have been releasing many cool tools, articles and tips on these areas of security.
4. Video & Tool of the week
Bypassing a WAF by Finding the Origin IP & CF-Bypass
@0xLupin released a new tool and video on bypassing WAFs (specifically Cloudflare) by finding the Origin IP using Security Trails’s historical data.
What I like about CF-Bypass is that it does not just look for the Origin IP but also tries to validate it and reduce false positives. So, even if you already have your own WAF bypass tool or do not want to use Security Trails, reading the code of this tool might give you some cool ideas to add to your own tooling.
5. Tip of the week
Burp Intruder’s predefined lists have placeholders that must be replaced with your custom settings
Are you using Burp Intruder’s predefined payload lists without additional configuration?
If you do, you may have missed vulnerabilities because these lists have placeholders that must be replaced with your own domain, email, nameserver, etc.
A small tweak that may easily cause you to miss out-of-band vulnerabilities!
Other amazing things we stumbled upon this week
Videos
- Bug Bounty Redacted #2: Third Party Subdomain Takeover & Exposed Admin Interfaces 
- Hacking Linux // Linux Privilege escalation // Featuring HackerSploit 
- Executing Linux Binaries Without Touching Disk – Living Off The Land with DDExec and Dirty Pipe Demo 
Podcasts & Audio
Webinars
Conferences
Slides & Workshop material
Tutorials
Medium to advanced
- Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation 
- Cloud-native security (container security Cheat Sheet) – Part 1 
Beginners corner
Writeups
Challenge writeups
Responsible(ish) disclosure writeups
- VMware Workspace ONE Access – Freemarker SSTI (CVE-2022-22954) PoC & Nuclei template 
- Securing Easy Appointments and earning CVE-2022-0482 #Web #CodeReview 
- CVE-2021-4119: [Bookstack] Email harvesting via SQL “LIKE” clause exploitation #Web #PHP #CodeReview 
- MacOS SUHelper Root Privilege Escalation Vulnerability: A Deep Dive Into CVE-2022-22639 & PoC #MacOS #LPE 
Bug bounty writeups
- Integer overflow in table extension (GitHub, $40,000) 
- How a YouTube Video lead to pwning a web application via SQL Injection worth $4324 bounty ($4,324) 
- Meta’s SparkAR RCE Via ZIP Path Traversal (Meta / Facebook, $2,500) 
See more writeups on The list of bug bounty writeups.
Tools
- ipcdn: Check which CDN providers an IP list belongs to 
- checkip: Get quick info on an IP address 
- Jeeves: Go tool that looks for time-based blind SQL injection through recon 
- spring4shell-scan: A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities 
- bore: A simple CLI tool for making tunnels to localhost 
Tips & Tweets
- Story of how 19-year-old @hacker_ gained ADMIN access to a Trans-Atlantic cable & Accessing 302 Military FTP servers 
- Something to try if you find URL shortened links in pentests 
- Two free IPinfo tools to quickly look at your target domain’s IP space 
- Jhaddix’s threads on Stealing checks worth millions & pwning a bank, Inspecting out-of-scope mobile apps & Finding SQL injection on a blog 
See more tips on this week’s Twitter collection.
Misc. pentest & bug bounty resources
- Insiders: Archive of Potential Insider Threats 
Articles
- Round Two: An Updated Universal Deserialisation Gadget for Ruby 2.x-3.x 
- Performing And Preventing Attacks On Azure Cloud Environments Through Azure Devops 
- Abusing Azure Hybrid Workers for Privilege Escalation – Part 1 
Challenges
- NahamCon CTF 2022 (April 28 – 30) 
- cicd-goat: Deliberately vulnerable CI/CD environment 
Bug bounty & Pentest news
- Cybersecurity 
- Upcoming events - Bounty Thursdays – Live (Thursday 14/4 16:00 CET) 
 
- Tool updates 
Non technical
You may also like
Intigriti Bug Bytes #228 - September 2025 🚀
September 12, 2025
Intigriti Bug Bytes #227 - August 2025 🚀
August 15, 2025
Intigriti Bug Bytes #226 - July 2025 🚀
July 18, 2025
 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                 
                                