Quantcast
Channel: Open Security Research
Browsing all 107 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Unsafe DLL Loading Vulnerabilities

By Muralidharan Vadivel. A common issue we see in applications is the order in which they import DLLs at runtime. This is referred to as a Load Order Vulnerability that can result in local privilege...

View Article


Image may be NSFW.
Clik here to view.

Creating Custom Peach Fuzzer Publishers

by Brad Antoniewicz.Peach is arguably the most established, freely available fuzzer out there. It has tons of built in functionality to support a huge range of features. While you can data model even...

View Article


Image may be NSFW.
Clik here to view.

Y U Phish Me? [Part 1]

By Melissa Augustine.Some emails have been censored for your protection :) A few days ago while I was browsing my inbox, I came across an interesting email from "Paypal" with the subject of "Help...

View Article

Image may be NSFW.
Clik here to view.

Y U Phish Me? [Part 2]

By Melissa Augustine. In the last blog post we had done some research on a spear phishing email I received. We used vim and regex to make our lives a bit easier for analysis purposes and we have...

View Article

Image may be NSFW.
Clik here to view.

Attacking Struts with CVE-2013-2251

By Mike McGilvray.Apache Struts is a free, open-source, MVC framework for creating elegant, modern Java web applications. It favors convention over configuration, is extensible using a plugin...

View Article


What's Really Open? Nmap Tips for an Accurate Port List

by Josh Bealey Anyone who has done lots of port scanning over the internet will know that Nmap often identifies certain ports as filtered. In this blog post, we'll look at alternative scans that can...

View Article

Image may be NSFW.
Clik here to view.

An Open Cyber Security Framework

By Mateo Martinez. In this blog post we´re going to present a brief overview of the Open Cyber Security Framework Project. There are a number of frameworks already on the market like the new NIST...

View Article

Image may be NSFW.
Clik here to view.

Identifying Malware Traffic with Bro and the Collective Intelligence...

By Ismael Valenzuela. In this post we will walk through some of the most effective techniques used to filter suspicious connections and investigate network data for traces of malware using Bro, some...

View Article


Image may be NSFW.
Clik here to view.

Combatting AppScan's "Scan out of session"

By Kunal Garg. Web application scanners may be full of repetition and obvious vulnerabilities but they do have their place in a web application penetration test. While they should never be used as the...

View Article


Image may be NSFW.
Clik here to view.

Extending Burp Proxy With Extensions

By Chris Bush. The world of information security is awash with tools to help security practitioners do their jobs more easily, accurately and productively. Regardless of whether you are responsible for...

View Article

Image may be NSFW.
Clik here to view.

Application Whitelisting Programs, WinXP EoS, and HIPAA's Security Rule

By The Foundstone Strategic Services Team. The United States Department of Health and Human Services (HHS) has stated that the “Security Rule does not specify minimum requirements for personal computer...

View Article

Secure Usage of Android Webview:

By Naveen Rudrappa The WebView class is one of the most powerful classes and it renders web pages like a normal browser. Applications can interact with WebView by adding a hook, monitoring changes...

View Article

Image may be NSFW.
Clik here to view.

Heartbleed Recap and Testing

By Mateo Martinez and Melissa Augustine.CVE-2014-0160 also known as the "Heartbleed Bug", is a serious vulnerability in OpenSSL, one of the most widely used cryptographic libraries. This bug has been...

View Article


Recap of BYOD Risks

By Kunal Garg. Bring Your Own Device (BYOD) has been a hot topic over the last two years as organizations begin to permit employees to bring personally owned mobile devices (such as laptops, tablets,...

View Article

Image may be NSFW.
Clik here to view.

Multi-Staged/Multi-Form CSRF

By Deepak Choudhary. Exploiting a CSRF vulnerability that relies on a single request (GET/POST) is often a simple task, and tools like Burp make effort even easier. However, exploitation can become...

View Article


Image may be NSFW.
Clik here to view.

Acquiring Linux Memory from a Server Far Far Away

By Dan Caban. In the past it was possible to acquire memory from linux systems by directly imaging (with dd) psudo-device files such as /dev/mem and /dev/kmem. In later kernels, this access was...

View Article

Image may be NSFW.
Clik here to view.

Debugging Android Applications

By Naveen Rudrappa. Using a debugger to manipulate application variables at runtime can be a powerful technique to employ while penetration testing Android applications. Android applications can be...

View Article


Dojo Toolkit and Risks with Third Party Libraries

By Deepak Choudhary. 3rd party libraries can become critical components of in-house developed applications, while the benefits to using them is huge, there is also some risks to consider. In this blog...

View Article

Image may be NSFW.
Clik here to view.

Privilege escalation with AppScan

By Kunal Garg. Web application vulnerability scanners are a necessary evil when it comes to achieving a rough baseline or some minimum level of security. While they should never be used as the only...

View Article

Image may be NSFW.
Clik here to view.

Approaches to Vulnerability Disclosure

By Brad Antoniewicz. The excitement of finding a vulnerability in piece of commercial software can quickly shift to fear and regret when you disclose it to the vendor and find yourself in a...

View Article
Browsing all 107 articles
Browse latest View live