Dionach Admin

Reviewing Your Security After Sony, RSA and IMF Breache

Perhaps it is worthwhile to review your security systems after Sony, RSA and IMF are all breached through either direct penetrations or phishing attacks. The various publicised data and network breaches (or “hacks”) this year seem to fall into two camps. The first camp includes the more straightforward direct penetrations into networks and websites, such […]

Vulnerability: Kodak InSite Troubleshooting Cross-Site Scripting

Kodak InSite is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. CVE: N/APublished: Mar 7 2011 08:55AMVulnerable: Kodak InSite 5.5.2 An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal […]

Vulnerability: Domino Sametime Server Reflected Cross-Site Scripting

Domino Sametime is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. CVE: CVE-2011-1038Published: Feb 16 2011 09:33AMCVS: 4.3Vulnerable: Domino Sametime 8.0.1 An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to […]

Vulnerabilities in Web Content Management Systems

There are vulnerabilities in Web Content Management Systems (WCMS) which are often overlooked, such as stored and reflected cross-site scripting attacks. During my time as a penetration tester I have come across a series of Web Content Management Systems (WCMS) including both Free Open Source Software (FOSS) and Commercial Off The Shelf (COTS) software deployed […]

Penetration Testing Is Not Vulnerability Scanning

Penetration testing is not vulnerability scanning and should not be confused. Vulnerability scanning is one of the first parts of the penetration test process. I recently received the go-ahead for an external penetration test which referred to the test as “a scan”. This is not the first time I have seen penetration testing and vulnerability […]

The Security Value of the Robots.txt file

There is a security value of the Robots.txt file but there are flaws such as ‘disallow’ entries revealing hidden folders, password lists and database backups. This is my view on the use of robots.txt as a security control and the problems of not having one. From my penetration testing experience there has been many occurrences of websites […]

Web Services Blind SQL Injection

An informative guide for using blind SQL injection on web services during penetration tests, using Python. There is plenty of documentation for using blind SQL injection in penetration tests. This code demonstrates exploiting blind SQL injection in a web service using Python. We often come across blind SQL injection in penetration tests, and SQL injection in web services […]

Contact Us

Contact Us Reach out to one of our cyber experts and we will arrange a call

We've launched Solas