Application Security This Week for June 16

Happy Father's Day!

 

Great writeup by Rapid7 about security-focused HTTP headers.

https://blog.rapid7.com/2019/05/30/hidden-helpers-security-focused-http-headers/?utm_medium=twitter&utm_content=http-headers&CS=twitter

 

Phishing kit used by the bad guys has a gaping insecure file upload bug.

https://www.theregister.co.uk/2019/06/05/akamai_phishing_kit_vuln/

 

"But it's inside the firewall!" Here's 18 cases of insider attacks in the banking industry.

https://medium.com/bugbountywriteup/18-cases-of-insider-bank-threats-16a29dcfca18

 

And, a little security related humor to lighten your week.

https://medium.com/commitlog/how-to-design-for-the-web-in-2019-a0be4d6702e2

 

And that's the news.

 

 

Application Security This Week for June 2

Accidentally Took Memorial Day Weekend Off Edition

 

New tool: FinalRecon- OSINT Tool For All-In-One Web Reconnaissance

https://blog.hackersonlineclub.com/2019/05/finalrecon-osint-tool-for-all-in-one.html?m=1

 

Permanent URL Hijack Through 301 HTTP Redirect Cache Poisoning

https://blog.duszynski.eu/domain-hijack-through-http-301-cache-poisoning/

 

Didier Stevens, one of my favorite researchers, mentioned that one of his readers has made a docker container with all of his tools.

https://blog.didierstevens.com/2019/05/27/dssuite-a-docker-container-with-my-tools/

 

There is a POC for CVE-2019-0708. Certainly is worth a look.

https://github.com/Ekultek/BlueKeep

 

Speaking of Docker, there is a bug that allows a hypervisor jump.

https://duo.com/decipher/docker-bug-allows-root-access-to-host-file-system

https://nakedsecurity.sophos.com/2019/05/31/unpatched-docker-bug-allows-read-write-access-to-host-os/

 

Finally, the always-wonderful folks at Portswigger have a cool analysis of Behavioral Fuzzing.

https://portswigger.net/blog/provoking-browser-quirks-with-behavioural-fuzzing

 

And that's the news! Have a great week.

Application Security This Week for May 19

Container security is a big deal, with OWASP A9 showing up more and more.  Here is a tool that will help with container scanning, and it is compatible with your continuous integration builds.

https://github.com/knqyf263/trivy

 

WhatsApp had a bug, but that doesn't dismiss the importance of end-to-end encryption.  Discuss.

https://www.wired.com/story/whatsapp-hack-phone-call-voip-buffer-overflow/

 

Someone found a user after free vulnerability in the Linux kernal going alllll the way back.

https://www.bleepingcomputer.com/news/security/linux-kernel-prior-to-508-vulnerable-to-remote-code-execution/

 

And that's the news!

 

 

Application Security This Week for May 12

If you have been in my classes, you know that I often point to weev as my example for why not to hack live sites.  Well, now I have a new example.

https://thehackernews.com/2019/05/israel-hamas-hacker-airstrikes.html

 

DHS is putting a 15 day deadline on all critical patches.  Maybe that Windows NT4SP2 box will get a little sumpn sumpn, huh?

https://thehackernews.com/2019/05/dhs-patch-vulnerabilities.html

 

The Google CTF is coming up in a month or so.  Start doing those ZAP pushups.

https://security.googleblog.com/2019/05/google-ctf-2019-is-here.html

 

El Reg has a great article on the latest (of many) SQLite RCE flaws.

https://www.theregister.co.uk/2019/05/10/sqlite_rce_vuln/

 

Y'all know that cryptography is not my best subject, but this is important. SHA1 is now provably just as broken as MD5, so start scrubbing it from codebases, except in cases like HMAC.

https://eprint.iacr.org/2019/459

 

That's the news!

Application Security This Week for April 28

Another Weblogic deserialization bug.

https://securityaffairs.co/wordpress/84450/breaking-news/oracle-weblogic-zeroday.html

I have a PR in for Nikto for it

https://github.com/sullo/nikto/pull/607

 

A reminder that application security is more than SQL Injection: good analysis of the bugs that caused the 737 Max wrecks. I had to drop it in Pastebin because IEEE put it behind the paywall.

https://pastebin.com/QEiKvvMM

 

Using Git dotfiles to bypass authentication.

https://blog.assetnote.io/bug-bounty/2019/04/23/getting-access-zendesk-gcp/

 

ZDNet, of all places, has a really good, plain language explainer of credential stuffing.

https://www.zdnet.com/article/an-inside-look-at-how-credential-stuffing-operations-work/

 

Little more on the dev side - 10 articles reviewed about using Python in machine learning.

https://hackernoon.com/10-great-articles-on-python-development-6f54dd38437f

 

And that 's the news!  I'll be on vacation next week, so see you on the 12th.

 

 

Application Security This Week for April 21

Hacky Easter is on!  Go get your CTF rolling.

https://hackyeaster.hacking-lab.com/hackyeaster/

 

XXE discovered in IE 11.

https://seclists.org/fulldisclosure/2019/Apr/20

 

DNS attacks are very much on the rise

https://www.engadget.com/2019/02/24/icann-warns-of-dns-attacks/?ncid=txtlnkusaolp00000618

https://www.golem.de/news/subdomain-takeover-microsoft-loses-control-over-windows-tiles-1904-140717.html

 

YAWAST goes to 0.7.  I use it on every test for recon.

https://adamcaudill.com/2019/04/19/yawast-v0-7-released/

 

Great overview of a white hat attack of a "secure" application.

https://securityaffairs.co/wordpress/84219/breaking-news/hacker-broke-tchap.html

 

That's the news, folks!

Application Security This Week for April 14

The Stack Overflow Survey is out and has some interesting insights

https://insights.stackoverflow.com/survey/2019

 

Rebex has built a tool to scan SSH servers, similar to the Qualis SSL scan

https://sshcheck.com/

 

A new OWASP project that I'm participating in is aiming at inventorying and improving the overall security postures of package managers - take a look

https://github.com/OWASP/packman

 

And that's the news!

Application Security This Week for April 7

PortSwigger has replaced the exercises in the Web Application Security Hacker's Handbook with the new Web Academy.

https://portswigger.net/web-security

 

An ARM assembler - in JavaScript.  I don't even have the words, this is so awesome.

https://azm.azerialabs.com/

 

Writing a talk?  Here are 60 information security statistics with corresponding references.

https://itblogr.com/60-must-know-cybersecurity-statistics-for-2019/

 

Google has started their own vulnerability database.  I'm not sure why, we already have several, but it is worth a look.

https://www.vulncode-db.com/

 

And that's the news!

Application Security This Week for March 31

No April Fools here.

 

Solid primer on using burp Collaborator for blind command injection.  One of the real benefits of Burp over ZAP.

https://threat.tevora.com/stop-collaborate-and-listen/

 

Bruce weighs in on a study where freelance devs were checked for their secure coding.  It didn't go well.

https://www.schneier.com/blog/archives/2019/03/programmers_who.html

 

A new tool for testing on Windows.  Now, I don't use Windows for EVERYTHING but it is nice for a lot of things.  I'll be checking this out.

https://securityaffairs.co/wordpress/83065/hacking/commando-vm-windows.html

 

And that's the news!

Application Security This Week for March 24

Bruce has some thoughts on a well-circulated article suggesting that application security isn't that important after all.

https://www.schneier.com/blog/archives/2019/03/an_argument_tha.html

 

Solid analysis of SimBad, a rogue malware campaign that infiltrated the Google Play store.

https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/

 

Terrifying tool that creates a spoofed cert for any website and signs an executable for AV Evasion.

https://github.com/paranoidninja/CarbonCopy

 

More awesome research from Rapid7, on deserialization bugs.  A topic, as regular readers know, that is near and dear to my heart.

https://www.rapid7.com/research/report/exploiting-jsos/

 

And that's the news!

Bill Sempf

Husband. Father. Pentester. Secure software composer. Brewer. Lockpicker. Ninja. Insurrectionist. Lumberjack. All words that have been used to describe me recently. I help people write more secure software.

 

 

profile for Bill Sempf on Stack Exchange, a network of free, community-driven Q&A sites

MonthList