<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Webspear Security]]></title><description><![CDATA[Webspear Security]]></description><link>https://hax.webspearsecurity.com</link><generator>RSS for Node</generator><lastBuildDate>Thu, 30 Apr 2026 10:50:08 GMT</lastBuildDate><atom:link href="https://hax.webspearsecurity.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[How I could have compromised a local company's entire AWS infrastructure]]></title><description><![CDATA[While exploring a renowned local company's website, I encountered a link that redirected me to a suspicious-looking web application. Upon inspecting the application, it became evident that it was certainly susceptible to a security issue; however, th...]]></description><link>https://hax.webspearsecurity.com/how-i-could-have-compromised-a-local-companys-entire-aws-infrastructure</link><guid isPermaLink="true">https://hax.webspearsecurity.com/how-i-could-have-compromised-a-local-companys-entire-aws-infrastructure</guid><category><![CDATA[bugbounty]]></category><category><![CDATA[AWS]]></category><dc:creator><![CDATA[Lawrence Mburu]]></dc:creator><pubDate>Tue, 19 Dec 2023 18:27:10 GMT</pubDate><content:encoded><![CDATA[<p>While exploring a renowned local company's website, I encountered a link that redirected me to a suspicious-looking web application. Upon inspecting the application, it became evident that it was certainly susceptible to a security issue; however, the specific vulnerability was not immediately identifiable.</p>
<h2 id="heading-analysing-javascript-code-for-juicy-secrets">Analysing JavaScript code for Juicy Secrets</h2>
<p>One of my initial steps in hacking a web application involves analyzing JS files. This practice typically aids in identifying the API endpoints that the web application interacts with. To accomplish this, I utilize <a target="_blank" href="https://github.com/GerbenJavado/LinkFinder">LinkFinder</a>, a Python CLI tool designed to extract API endpoints from specified JS files.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1703007082432/f1b32a8e-6bac-42c9-aea4-1f97104c44f4.png" alt class="image--center mx-auto" /></p>
<p>The API endpoints that were identified didn't offer much functionality since the majority of them necessitated a valid session for interaction. Consequently, I returned to manually search for any hardcoded secrets within the JavaScript file.</p>
<p>Upon interacting with the application, I could tell that it was hosted on AWS. Thus, I initiated my search in the JS file for the pattern <code>AKIA</code> which serves as the initial characters for AWS Access Key ID, except those retrieved from AWS STS service, which start with <code>ASIA</code>. Astonishingly, I discovered several instances matching this search pattern. Consequently, I was able to uncover the AWS Secret Access Key, displayed in plain text, along with other credentials for Auth0. Enclosed below is a heavily redacted screenshot depicting the hardcoded credentials.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1703008656874/ef482c72-e8c0-4718-832f-dc71b4da830c.png" alt class="image--center mx-auto" /></p>
<p>Exporting the AWS access keys on my terminal and running <code>aws sts get-caller-identity</code> command confirmed the credentials were valid.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1703009045727/e99392a4-4e62-46a2-9153-9056de3bc319.png" alt class="image--center mx-auto" /></p>
<p>Using the credentials to list all AWS S3 buckets in the organization.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1703009305321/bf04c53e-ad5f-4031-8395-7304a3be8251.png" alt class="image--center mx-auto" /></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1703010124392/eefc8f9a-7e6e-48ae-8dd4-4659ada67aca.png" alt class="image--center mx-auto" /></p>
<p>List all <code>IAM</code> users in the AWS account</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1703009425540/fc5f350d-e57c-4027-b3c1-4164204fe1c7.png" alt class="image--center mx-auto" /></p>
<p>Listing all database instances</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1703009530886/d33af866-41cb-4e92-805e-cc812d8e38e8.png" alt class="image--center mx-auto" /></p>
<p>The exposed AWS credentials evidently possessed Administrator permissions throughout the AWS account, likely resulting from linking the <code>AdministratorAccess</code> AWS policy to the <code>IAM</code> user. This potential scenario could have empowered a malicious user to inflict significantly greater damage to the provisioned AWS resources.</p>
<p>I sent an email to the mentioned company, clearly outlining the issue and providing recommended steps for remediation. Due to their delayed response, I felt compelled to call them, considering the sensitivity of the issue after which they promptly resolved the vulnerability.</p>
<h2 id="heading-conclusion">Conclusion</h2>
<ul>
<li><p>It's crucial for developers not to assume that minifying JavaScript code hides any hardcoded sensitive information.</p>
</li>
<li><p>A proactive approach, such as implementing basic security scans in the CI/CD pipelines, helps in identifying and resolving issues like hardcoded credentials before deploying the application. This <code>shift-left</code> strategy enhances security measures.</p>
</li>
<li><p>Monitoring the usage of AWS credentials through services like CloudTrail is essential for detecting any abnormal activities or deviations from the usual pattern.</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Navigating Bug Bounty Programs: Enhancing Cyber Security in the Digital Landscape]]></title><description><![CDATA[In our interconnected world, where technology plays a pivotal role in every aspect of our lives, the importance of cyber security cannot be overstated. As technology advances, so do the risks associated with it. One critical aspect of bolstering cybe...]]></description><link>https://hax.webspearsecurity.com/navigating-bug-bounty-programs-enhancing-cyber-security-in-the-digital-landscape</link><guid isPermaLink="true">https://hax.webspearsecurity.com/navigating-bug-bounty-programs-enhancing-cyber-security-in-the-digital-landscape</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Cybercrime]]></category><category><![CDATA[bugbounty]]></category><dc:creator><![CDATA[Lawrence Mburu]]></dc:creator><pubDate>Mon, 18 Dec 2023 15:06:50 GMT</pubDate><content:encoded><![CDATA[<p>In our interconnected world, where technology plays a pivotal role in every aspect of our lives, the importance of cyber security cannot be overstated. As technology advances, so do the risks associated with it. One critical aspect of bolstering cyber security measures is understanding and addressing software bugs, which can potentially expose vulnerabilities in digital systems. Bug bounty programs have emerged as a proactive approach towards identifying and rectifying these vulnerabilities, significantly enhancing cyber security posture in the ever-evolving digital landscape.</p>
<h3 id="heading-software-bugs-in-cyber-security"><strong>Software Bugs in Cyber Security</strong></h3>
<p>Bugs, in the context of cyber security, refer to flaws or weaknesses within software that malicious actors can exploit to gain unauthorized access, disrupt services, or compromise sensitive data. These vulnerabilities can range from simple coding errors to complex loopholes that can be exploited for malicious purposes.</p>
<p>While developers strive to create robust and secure software, the reality is that no system is entirely free of bugs. The continuous development and updates of software, often performed under tight deadlines, can inadvertently introduce security vulnerabilities. Therefore, the identification and resolution of these issues is crucial to maintaining the overall security of digital systems.</p>
<h3 id="heading-role-of-bug-bounty-programs"><strong>Role of Bug Bounty Programs</strong></h3>
<p>Bug bounty programs serve as an essential component in the fight against cyber threats. These initiatives invite ethical hackers, security researchers, and enthusiasts from around the globe to uncover vulnerabilities within software, websites, or mobile applications. Companies running these programs offer rewards, ranging from monetary compensation to recognition, for the responsible disclosure of bugs.</p>
<p>By crowdsourcing security testing to a diverse community of skilled individuals, bug bounty programs leverage the collective expertise and creativity of participants. This approach enables organizations to identify and address vulnerabilities before malicious actors exploit them, thereby fortifying their cyber defenses.</p>
<p>Some of the renowned bug bounty platforms include HackerOne, BugCrowd, Intigriti, YesWeHack, Inspectiv etc.</p>
<h3 id="heading-advantages-of-bug-bounty-programs"><strong>Advantages of Bug Bounty Programs</strong></h3>
<ol>
<li><p><strong>Enhanced Security Posture</strong>: Bug bounty programs act as proactive measures, allowing companies to identify and patch vulnerabilities before they are exploited, strengthening their security posture.</p>
</li>
<li><p><strong>Diverse Perspectives</strong>: Engaging a global pool of ethical hackers and researchers provides a variety of perspectives and approaches to identify potential weaknesses that internal security teams might overlook.</p>
</li>
<li><p><strong>Cost-Effective Security Testing</strong>: Leveraging external talent through bug bounty programs can be more cost-effective than maintaining an in-house security team dedicated solely to finding vulnerabilities.</p>
</li>
<li><p><strong>Continuous Improvement</strong>: Bug bounty programs encourage continuous improvement by fostering a culture of security awareness and proactive risk mitigation within organizations.</p>
</li>
</ol>
<h3 id="heading-challenges-and-ethical-considerations"><strong>Challenges and Ethical Considerations</strong></h3>
<p>While bug bounty programs offer significant benefits, they are not without challenges. Coordinating report submissions, validating reported bugs, and ensuring ethical conduct among bug bounty participants can pose logistical and managerial hurdles for organizations. Moreover, defining ethical boundaries, avoiding potential conflicts of interest, and safeguarding user data during testing are critical ethical considerations when establishing a bug bounty program.</p>
<h3 id="heading-conclusion"><strong>Conclusion</strong></h3>
<p>In an era where cyber threats continue to evolve, bug bounty programs represent a proactive and collaborative approach to fortifying cyber security defenses. By harnessing the expertise of a global community, these initiatives contribute to the identification and resolution of software security vulnerabilities, ultimately making digital systems more secure.</p>
<p>As technology continues to advance, the evolution of bug bounty programs will likely play an increasingly integral role in safeguarding the digital ecosystem. Embracing these programs as a proactive measure can empower organizations to stay ahead in the ongoing battle against cyber crime, ensuring a safer and more secure online experience for all.</p>
]]></content:encoded></item><item><title><![CDATA[Year In Review: 2023]]></title><description><![CDATA[As the year 2023 draws to a close, it's time to take a retrospective journey through the rollercoaster of experiences, challenges, and achievements that defined this year for me. From career highs to unexpected lows, this year was a testament to adap...]]></description><link>https://hax.webspearsecurity.com/year-in-review-2023</link><guid isPermaLink="true">https://hax.webspearsecurity.com/year-in-review-2023</guid><category><![CDATA[2023-year-in-review]]></category><dc:creator><![CDATA[Lawrence Mburu]]></dc:creator><pubDate>Wed, 06 Dec 2023 06:25:12 GMT</pubDate><content:encoded><![CDATA[<p>As the year 2023 draws to a close, it's time to take a retrospective journey through the rollercoaster of experiences, challenges, and achievements that defined this year for me. From career highs to unexpected lows, this year was a testament to adaptability, perseverance, and the pursuit of new opportunities.</p>
<h2 id="heading-career-milestones-and-professional-growth"><strong>Career Milestones and Professional Growth</strong></h2>
<p>One of the defining moments of 2023 was my elevation from a Lead Security Engineer to the role of Head of Infrastructure and Security. This shift allowed me to lead a talented team of Site Reliability Engineers (SREs) and Security experts in crafting a robust, reliable, and secure platform. The focus on collaboration and innovation led to the development of extensive automation tools that streamlined processes and eliminated manual tasks, enhancing efficiency and effectiveness across the board.</p>
<h3 id="heading-company-closure-and-job-transition"><strong>Company Closure and Job Transition</strong></h3>
<p>However, with every peak comes the possibility of an unforeseen valley. In a surprising turn of events, the company I was part of faced bankruptcy, resulting in the unfortunate loss of my job. September marked the closure, leading to a period of uncertainty and reflection.</p>
<h3 id="heading-resurgence-in-bug-bounty-hunting"><strong>Resurgence in Bug Bounty Hunting</strong></h3>
<p>A highlight of my year was reigniting my passion for bug bounty hunting on HackerOne. With focused determination, I invested time and effort into uncovering vulnerabilities, culminating in a successful third quarter. This period was exceptionally rewarding, with numerous critical and high-severity issues discovered. Moreover, I'm thrilled to have secured the 1st place in the <a target="_blank" href="https://hackerone.com/leaderboard/country?year=2023&amp;quarter=3&amp;country=KE">Kenyan leaderboard for Q3</a>.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1701843787136/945f294e-6c91-4d65-9f6c-0135b98810aa.png" alt class="image--center mx-auto" /></p>
<p>The HackerOne conversational AI also created a funny story about my HackerOne 2023 journey. While it's fictional, specially the intro part, most of it is based on true events that transpired during my hacking and bug bounty journey of 2023. You can read more <a target="_blank" href="https://hackerone.com/stories-about-2023/04edc585de0440a93feb0405">here</a>.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1702878023058/57f213bf-1b81-4342-87eb-22a83bec6371.png" alt class="image--center mx-auto" /></p>
<p>Overall, I'm quite happy with what I managed to achieve with regards to Hacking and Bug Bounty this year. I'm looking forward to more of this success in the coming year.</p>
<h3 id="heading-embracing-change-joining-buckhill-software"><strong>Embracing Change: Joining BuckHill Software</strong></h3>
<p>Navigating the tides of change, I seized an opportunity to embark on a new professional journey. I am thrilled to have joined BuckHill Software, embracing fresh challenges and contributing my expertise to a dynamic team.</p>
<h2 id="heading-whats-new-for-2024"><strong>What's New for 2024?</strong></h2>
<h3 id="heading-exploring-smart-contract-auditing"><strong>Exploring Smart Contract Auditing</strong></h3>
<p>Looking ahead to the coming year, I am eager to delve into the fascinating realm of smart contract auditing. The burgeoning field of blockchain technology and decentralized applications presents an exciting avenue to deepen my knowledge and expertise.</p>
<h3 id="heading-building-a-cybersecurity-consulting-company"><strong>Building a Cybersecurity Consulting Company</strong></h3>
<p>Additionally, my aspirations for 2024 include establishing a cybersecurity consulting company. Leveraging my diverse experiences and insights gained over the years, I aim to offer tailored solutions, helping businesses fortify their digital infrastructure against evolving threats.</p>
<p>As the curtains fall on 2023, I am grateful for the opportunities, lessons, and growth this year has brought. I carry forward the learnings and experiences, poised to embrace the challenges and triumphs that await in the promising horizon of 2024.</p>
]]></content:encoded></item><item><title><![CDATA[Accessing employees video recordings via leaked API keys in a public github repository]]></title><description><![CDATA[Introduction
I received an invitation to a HackerOne private program. This came after being away from the bug bounty scene for close to 5 months straight. So I decided to take a look in hopes of finding something.
The Target
The program had a small s...]]></description><link>https://hax.webspearsecurity.com/accessing-employees-video-recordings-via-leaked-api-keys-in-a-public-github-repository</link><guid isPermaLink="true">https://hax.webspearsecurity.com/accessing-employees-video-recordings-via-leaked-api-keys-in-a-public-github-repository</guid><category><![CDATA[github-recon]]></category><category><![CDATA[bugbounty]]></category><dc:creator><![CDATA[Lawrence Mburu]]></dc:creator><pubDate>Sat, 25 Nov 2023 12:38:44 GMT</pubDate><content:encoded><![CDATA[<h1 id="heading-introduction">Introduction</h1>
<p>I received an invitation to a HackerOne private program. This came after being away from the bug bounty scene for close to 5 months straight. So I decided to take a look in hopes of finding something.</p>
<h1 id="heading-the-target">The Target</h1>
<p>The program had a small scope. It's main production and staging applications were the only ones in scope, <code>dashboard.redacted.co</code> and <code>staging-dashboard.redacted.co</code>. I created an account in the production app and started checking out the functionalities of the application.</p>
<p>It was day two of testing the application and still could not find anything significant worth reporting. So I decided to switch tactics and do a little bit of recon. Given that only two domains were in scope, I did'nt have much options for recon other than JavaScript analysis and GitHub recon.</p>
<h1 id="heading-github-recon">GitHub Recon</h1>
<p>The program had a GitHub org for sharing their public plugins with the developer community. I navigated all the public repositories looking at the commit history for any information that could be of interest.</p>
<p>After a few hours, one repo piqued my interest, due to references to <code>apiKey</code> parameters. I digged into the source code and managed to find working <code>apiKeys</code> for the staging environment.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1700915097473/414c4ceb-bd52-4e68-a825-0ee62d17204e.png" alt class="image--center mx-auto" /></p>
<p>Among other attack vectors, the program was also mostly interested in the ability of an attacker to gain access to other users' video recordings. They offered services similar to Google Meets, with the ability of recording meeting sessions which were stored in S3 buckets.</p>
<p>Using a valid <code>apiKey</code>, you could retrieve AWS S3 presigned URLS to download recordings in the S3 buckets via the API if the <code>apiKey</code> had the permissions to. I was lucky in that the <code>apiKey</code> leaked in the GithHub repo had admin permissions across the org, allowing me to retrieve download URLS for every recording in the org.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1700932357794/99bb0f12-1dbe-4887-82b3-2ebd86c96aa0.png" alt class="image--center mx-auto" /></p>
<p>I was able to access meeting recordings of employees of the company, testing new features of the product and having private discussions. I filed a report on HackerOne and they triaged it as a <code>High</code> severity issue, paying a 4 digit bounty and an additional $50 for completing a retest.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1700915613720/71fe6de5-3dc0-47b4-bed2-bea22a9b516f.png" alt class="image--center mx-auto" /></p>
<h1 id="heading-conclusions">Conclusions</h1>
<p>It's common to face a target with a narrow scope. In such cases always try to widen the attack surface within limits that could still fall into scope as dictated by the bug bounty program policy.</p>
]]></content:encoded></item></channel></rss>