Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

BSidesSF 2020 - Maria Mora's, Chloé Messdaghi's, Jeff Boothby's, Tanner Emek's, Ben Sadeghipour's 'Panel: Let's Get 360 w/Bug Bounty!' →

April 14, 2020 by Marc Handelman in BSides San Francisco, Conferences, Education, Information Security, Bug Bounty, Bug Hunting
April 14, 2020 /Marc Handelman
BSides San Francisco, Conferences, Education, Information Security, Bug Bounty, Bug Hunting

Security BSides London 2019, Jamie O'Hare's 'Bug Bounties: Crowdsourcing Nosey Bastards' →

August 29, 2019 by Marc Handelman in BSides London 2019, Bug Bounty, Bug Hunting, Conferences, Education, Information Security

Many thanks to Security BSides London for publishing their outstanding conference videos on YouTube.

August 29, 2019 /Marc Handelman
BSides London 2019, Bug Bounty, Bug Hunting, Conferences, Education, Information Security

Instagram 2FA Bypass, A Tale of Superlative Bug Hunting Skills & Indolent Multi-Factor Authentication

July 19, 2019 by Marc Handelman in Facebookery, 2FA Flaws, Information Security, Bugs, Bug Bounty, Bug Hunting

Via Tara Seals writing at the Threatpost Blog, detailing the highly competent bug hunting skill set of Laxman Muthiyah, examining - if you will - the lackadaisical 2FA data flow promulgated by Facebook, Inc. (Nasdaq: FB) on the company's owned Instagram.

"Independent researcher Laxman Muthiyah took a look at Instagram’s mobile recovery flow, which involves a user receiving a six-digit passcode to their mobile number for two-factor account authentication (2FA). So, with six digits that means there are 1 million possible combinations of digits making up the codes." - Via Tara Seals writing at the Threatpost Blog

July 19, 2019 /Marc Handelman
Facebookery, 2FA Flaws, Information Security, Bugs, Bug Bounty, Bug Hunting

DREAD, The Pirate Approach →

June 05, 2018 by Marc Handelman in Code, Bugs, Bug Bounty

via the inimitable Adam Shostack (author of The New School of Information Security) and Threat Modeling; a leader in the Threat Modeling arena), whilst writing at his fascinating blog, comes a sterling discussion of the DREAD method; or How To Name A Bug Bounty Program. Certainly, today's MustRead, enjoy!

June 05, 2018 /Marc Handelman
Code, Bugs, Bug Bounty