MonkeHacks #94

Finally, I’ve returned to Scotland - 14.5 hours from Tokyo to Paris, and then 2 hours to Edinburgh. I had a fantastic (albeit exhausting) trip. The LHE venue was out in Chiba near Tokyo Disneyland, which was isolated from the rest of Tokyo so there wasn’t actually a whole pile of stuff to do there if you don’t care about Disney. The event itself was fantastic. I caught up with some hacker bros, made some new friends, and had a great time.

I’m back in Scotland for about 10 days before I fly off to Japan again, this time with my best friend from Ireland, for 3 weeks. My cats are also going on holidays; to a luxury cat hotel in Edinburgh. I hope they’ll be comfortable there while I’m away.

36 Monke Views of Mt. Fuji. But seriously, this was a photo I took from Haneda airport the day before I left Japan. You need a windy day to blow the haze away to see the volcano.

Weekly Ideas / Notes

  • The LHE went well - I had a few good findings with my team, so I’m satisfied with how it went overall. The onsite days were intense; we’d wake up, have breakfast in the hotel cafeteria, then settle in for a day of hacking in the ballroom that was the main venue on both days. The coffee they served was weaker than usual, so we went back to the machine for multiple helpings throughout the day. That was nice, too, in that it provided some breaks to walk around a bit and think about the scope. The scope was great, really enjoyable and had quite a bit of depth to it.

    • It’s hard to describe what being in a LHE is actually like. I’m a bit desensitised to it (this was LHE number… 11 for me? I think?) but it’s no less fun every time. Sometimes bug bounty comes across as a bit of a soulless endeavour, but at LHEs, you meet the staff and the program managers and such that are behind the scenes, and they add a level of depth to everything that’s hard to describe. The stakes are different for both you and them when you submit a bug. The staff (usually) do appreciate elegant bugs. Which, considering the spam they usually receive, I can hardly blame them for.

  • I got tickets for Bsides Dublin (which is happening in May). Last year I gave a workshop there; this year I didn’t feel like giving a talk, so I’m going as a simple attendee. I know the folks at Bsides Dublin by now, so it’s a nice annual ritual of mine to go and chat with them.

  • These days I’ve been thinking more about bug bounty, and which parts of it actually have an impact on a company’s security posture. The reality is that it’s highs and crits. Things that can affect the company’s stock price, or customers. Being more involved on the business side has forced me to think more businesslike about other things too, including bug bounty.

  • I published VolumeLeak on the Starstrike blog. It’s a really interesting vulnerability that I found with Busfactor, where I created a classifier system to exfiltrate data out of a limited set of circumstances. I think we’ll see more usage of classifier systems in data exfiltration in the future. There are often tool calls with limited write capabilities, after all.

  • I’m optimistic about AI security in general. I really do think that guardrails will be a good enough deterrent to prevent prompt injections, if they’re developed in the right way.

Reading List

Title

Pages

Author

The Night Circus

130/512

Erin Morgenstern

Solenoid

130/600

Mircea Cărtărescu

A Random Walk Down Wall Street

150/300

Burton Malkiel

How The World Made The West

265/400

Josephine Crawley Quinn

Founders At Work

221/472

Jessica Livingston

Resources

Keep Reading