Bug Bytes #183 – Learning, reflecting and hacking

By travisintigriti

November 30, 2022

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.

This issue covers the weeks from November 14th until November 27th.

CLICK HERE TO SUBSCRIBE

Intigriti News

From my notebook

This week’s top 5 theme is about learning new skills. I think this is something that all hackers will relate to, in this field you are always reading articles, watching videos, etc and looking for new tools, techniques and that’s probably why you’re reading this blog post. But more important than just consuming new information is to reflect on what you’ve learned, organise it in your head and turn it into useful information. One of the best ways I’ve found to do that and actually improve my own learning has been by creating content, so today that’s what I’m sharing 5 pieces of content from folks who are learning and sharing.

  1. Learning SECURE CODE REVIEW!

  2. Most important security lessons of 2022 for me

  3. My Top 7 Favorite Websites to (Legally) Improve My Web-Hacking Skills

  4. So, you want to get into bug bounties?

  5. Blind Students Learn Lockpicking (w/ Deviant Ollam)

Other Amazing Things

You may also like

Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  Finding an RCE using AI in GitHub  CORS exploitation cheat sheet  Scanning codebases with AI  Bypassing paywalls  SSTIs in AI models    And so much more! Let’s dive in! We are thrilled to announce that Inti

Read more

Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  Cool trick to find disclosed secrets in internal web extensions A repository full of WAF bypasses Hacking Intercom misconfigurations Wayback Machine for hackers And so much more! Let’s dive in! October’s 

Read more

Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  A common (yet unknown) SSRF attack vector in Next.js Middleware  Exploiting PDF processors by generating and uploading malicious PDF payload files  A full reconnaissance breakdown on how to approach any target 

Read more