Bug Bytes #211 – Hacking Casinos, Microsoft’s Key Mishap, Read the Docs and ImageMagick Strikes Again

By travisintigriti

September 13, 2023

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources.

This issue covers the week from September 5th to September 10th

Intigriti News

From my notebook

  1. Bug Bounty Stories (EP1): Hacking An Online Casino – Slightly different format of video, but a really interesting look into NahamSec’s process

  2. Results of Major Technical Investigations for Storm-0558 Key Acquisition – Oops from Microsoft

  3. API Security Testing using AI in Postman – Really good guide on using Postman for API hacking, instead of or with Burp

  4. Tricky Unauthenticated RCE on WordPress Media Library Assistant Plugin using a good old Imagick – Oh ImageMagick my old friend what you have you done this time

  5. Episode 35: King of Collaboration: Douglas Day – ArchAngelDDay talks about how he finds bugs, his approach and auth testing

Join 125,000+ Security Researchers Getting Monthly Bug Bounty Tips & Insights!

You may also like

Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  Finding an RCE using AI in GitHub  CORS exploitation cheat sheet  Scanning codebases with AI  Bypassing paywalls  SSTIs in AI models    And so much more! Let’s dive in! We are thrilled to announce that Inti

Read more

Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  Cool trick to find disclosed secrets in internal web extensions A repository full of WAF bypasses Hacking Intercom misconfigurations Wayback Machine for hackers And so much more! Let’s dive in! October’s 

Read more

Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  A common (yet unknown) SSRF attack vector in Next.js Middleware  Exploiting PDF processors by generating and uploading malicious PDF payload files  A full reconnaissance breakdown on how to approach any target 

Read more