Unsafe DLL Loading Vulnerabilities
By Muralidharan Vadivel. A common issue we see in applications is the order in which they import DLLs at runtime. This is referred to as a Load Order Vulnerability that can result in local privilege...
View ArticleCreating Custom Peach Fuzzer Publishers
by Brad Antoniewicz.Peach is arguably the most established, freely available fuzzer out there. It has tons of built in functionality to support a huge range of features. While you can data model even...
View ArticleY U Phish Me? [Part 1]
By Melissa Augustine.Some emails have been censored for your protection :) A few days ago while I was browsing my inbox, I came across an interesting email from "Paypal" with the subject of "Help...
View ArticleY U Phish Me? [Part 2]
By Melissa Augustine. In the last blog post we had done some research on a spear phishing email I received. We used vim and regex to make our lives a bit easier for analysis purposes and we have...
View ArticleAttacking Struts with CVE-2013-2251
By Mike McGilvray.Apache Struts is a free, open-source, MVC framework for creating elegant, modern Java web applications. It favors convention over configuration, is extensible using a plugin...
View ArticleWhat's Really Open? Nmap Tips for an Accurate Port List
by Josh Bealey Anyone who has done lots of port scanning over the internet will know that Nmap often identifies certain ports as filtered. In this blog post, we'll look at alternative scans that can...
View ArticleAn Open Cyber Security Framework
By Mateo Martinez. In this blog post we´re going to present a brief overview of the Open Cyber Security Framework Project. There are a number of frameworks already on the market like the new NIST...
View ArticleIdentifying Malware Traffic with Bro and the Collective Intelligence...
By Ismael Valenzuela. In this post we will walk through some of the most effective techniques used to filter suspicious connections and investigate network data for traces of malware using Bro, some...
View ArticleCombatting AppScan's "Scan out of session"
By Kunal Garg. Web application scanners may be full of repetition and obvious vulnerabilities but they do have their place in a web application penetration test. While they should never be used as the...
View ArticleExtending Burp Proxy With Extensions
By Chris Bush. The world of information security is awash with tools to help security practitioners do their jobs more easily, accurately and productively. Regardless of whether you are responsible for...
View ArticleApplication Whitelisting Programs, WinXP EoS, and HIPAA's Security Rule
By The Foundstone Strategic Services Team. The United States Department of Health and Human Services (HHS) has stated that the “Security Rule does not specify minimum requirements for personal computer...
View ArticleSecure Usage of Android Webview:
By Naveen Rudrappa The WebView class is one of the most powerful classes and it renders web pages like a normal browser. Applications can interact with WebView by adding a hook, monitoring changes...
View ArticleHeartbleed Recap and Testing
By Mateo Martinez and Melissa Augustine.CVE-2014-0160 also known as the "Heartbleed Bug", is a serious vulnerability in OpenSSL, one of the most widely used cryptographic libraries. This bug has been...
View ArticleRecap of BYOD Risks
By Kunal Garg. Bring Your Own Device (BYOD) has been a hot topic over the last two years as organizations begin to permit employees to bring personally owned mobile devices (such as laptops, tablets,...
View ArticleMulti-Staged/Multi-Form CSRF
By Deepak Choudhary. Exploiting a CSRF vulnerability that relies on a single request (GET/POST) is often a simple task, and tools like Burp make effort even easier. However, exploitation can become...
View ArticleAcquiring Linux Memory from a Server Far Far Away
By Dan Caban. In the past it was possible to acquire memory from linux systems by directly imaging (with dd) psudo-device files such as /dev/mem and /dev/kmem. In later kernels, this access was...
View ArticleDebugging Android Applications
By Naveen Rudrappa. Using a debugger to manipulate application variables at runtime can be a powerful technique to employ while penetration testing Android applications. Android applications can be...
View ArticleDojo Toolkit and Risks with Third Party Libraries
By Deepak Choudhary. 3rd party libraries can become critical components of in-house developed applications, while the benefits to using them is huge, there is also some risks to consider. In this blog...
View ArticlePrivilege escalation with AppScan
By Kunal Garg. Web application vulnerability scanners are a necessary evil when it comes to achieving a rough baseline or some minimum level of security. While they should never be used as the only...
View ArticleApproaches to Vulnerability Disclosure
By Brad Antoniewicz. The excitement of finding a vulnerability in piece of commercial software can quickly shift to fear and regret when you disclose it to the vendor and find yourself in a...
View Article