Perhaps it is worthwhile to review your security systems after Sony, RSA and IMF are all breached through either direct penetrations or phishing attacks. The various publicised data and network breaches (or “hacks”) this year seem to fall into two camps. The first camp includes the more straightforward direct penetrations into networks and websites, such […]
Vulnerability: Kodak InSite Troubleshooting Cross-Site Scripting
Kodak InSite is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. CVE: N/APublished: Mar 7 2011 08:55AMVulnerable: Kodak InSite 5.5.2 An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal […]
Vulnerability: Domino Sametime Server Reflected Cross-Site Scripting
Domino Sametime is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. CVE: CVE-2011-1038Published: Feb 16 2011 09:33AMCVS: 4.3Vulnerable: Domino Sametime 8.0.1 An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to […]
Vulnerabilities in Web Content Management Systems
There are vulnerabilities in Web Content Management Systems (WCMS) which are often overlooked, such as stored and reflected cross-site scripting attacks. During my time as a penetration tester I have come across a series of Web Content Management Systems (WCMS) including both Free Open Source Software (FOSS) and Commercial Off The Shelf (COTS) software deployed […]
Penetration Testing Is Not Vulnerability Scanning
Penetration testing is not vulnerability scanning and should not be confused. Vulnerability scanning is one of the first parts of the penetration test process. I recently received the go-ahead for an external penetration test which referred to the test as “a scan”. This is not the first time I have seen penetration testing and vulnerability […]
The Security Value of the Robots.txt file
There is a security value of the Robots.txt file but there are flaws such as ‘disallow’ entries revealing hidden folders, password lists and database backups. This is my view on the use of robots.txt as a security control and the problems of not having one. From my penetration testing experience there has been many occurrences of websites […]
Update to ISO 27001 Planned for 2013
There is an update to ISO 27001 planned for 2013 whereby the management system standards will be harmonised, the dropping of Plan Do Check Act model etc. I went to the UK User Group Consultation at BSI on 25th January. This provided the attendees to get an overview of the changes and comment on them. […]
Web Services Blind SQL Injection
An informative guide for using blind SQL injection on web services during penetration tests, using Python. There is plenty of documentation for using blind SQL injection in penetration tests. This code demonstrates exploiting blind SQL injection in a web service using Python. We often come across blind SQL injection in penetration tests, and SQL injection in web services […]
Common ISO 27001 Gaps
Based on a review of 20 gap audit reports for a variety of organizations, this article should help your organization if you are considering ISO 27001, or wish to ensure you comply with best practice. Common-ISO-27001-Gaps.pdf (1.16 MB)
Application Penetration Testing Versus Vulnerability Scanning
This article demonstrates real-world examples of the different types of flaws found only through manual testing. Application-Penetration-Testing-Versus-Vulnerability-Scanning.pdf (823 KB)