Penetration Testing/Ethical Hacking/Etc | Jobs/Etc
Efficiently Identify and Remediate Application Vulnerabilities Finding vulnerabilities is only the first step to remediation. Making sense of the endless reports from dynamic and static scanners can be a daunting task, and when you add in results from manual testing, looking for trends and benchmarks can be like searching for a needle in a haystack. Denim Group has created ThreadFix, a tool designed to give security practitioners the ability to understand the security of their applications and efficiently conduct remediation.
We are excited to announce the release of ThreadFix 1.1. Many thanks to everyone who helped us put the ThreadFix 1.1 release candidates through their paces. We've fixed a whole bunch of bugs, improved system performance, and integrated several new features (including many features that address concerns voiced by some of our Enterprise customers), including adding integration with two (2) additional scanning tools, significant improvements to JIRA integration, and various updates and bug fixes and enhancements.
We’ve heard of this OldApps.com many times before but a recent tweet from @ taosecurity mentioning it put this resource over the top that we had to write it up for those in pen testing, exploit creation, … or just testing overall. You’re not going to find any licensed software but it’s a great place for grabbing that old copy of Firefox or Adobe Reader for you to test against. Here’s the description from OldApps.com themselves. While most web-sites provide downloads of current versions, OldApps.com caters to a different market of interest by providing older versions of the same useful programs. Often newer versions are more complicated to use and we understand that it is hard to find older, more user-friendly versions of popular software. Many software providers do not include older versions of their software on their sites, therefore, OldApps.com has found its market niche and provides a vital intermediary function for our users’ software needs.
The process of discovering web applications and their current version on a target domain is known as web application fingerprinting. Effective fingerprinting enables a penetration tester to perform targeted exploit delivery as knowing the version is sufficient to infer vulnerabilities. BlindElephant Web Application Fingerprinter The BlindElephant Web Application Fingerprinter attempts to discover the version of a (known) web application by comparing static files at known locations against precomputed hashes for versions of those files in all all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatable. plecost - Wordpress fingerprinting tool
<img width="500" height="100" src="http://danielmiessler.com/images/google_http_header.png" alt="Google HTTP Header"/> What follows is a primer on the key security-oriented characteristics of the HTTP protocol. It's a collection of a number of different sub-topics, explained in my own way , for the purpose of having a single reference point when needed. Basics Message-based You make a request, you get a response.
OWASP BASC 2010 / Hacking SAP BusinessObjects OWASP AppSec DC 2010 / Hacking SAP BusinessObjects Rochester Security Summit / Security Immaturity Source Barcelona 2010 / Hacking SAP BusinessObjects SANS Pentest Summit 2010 / Goal Oriented Pentesting
Ethical Hacking-Your Way To The World Of IT Security: Subterfuge - Man-in-the-Middle Attack Framework TutorialStumbleUpon
Posted on 20 April 2012.
Exclusive - Source Code Spoofing with HTML5 and the LRO Character Article Written by John Kurlak for The Hacker News,He is senior studying Computer Science at Virginia Tech. Today John will teach us that How to Spoof the Source Code of a web page.
Ben Heinkel - 31st May 2012 In this post of the series, I will go into some detail on the various mitigations and configuration changes required to be made to your SAP environment to help protect against the attacks described in the two previous posts. While some of the mitigations are general network security recommendations, such as appropriate network segregation and filtering, others are specific to SAP and the security risks posed by a default Netweaver installation. The recommendations listed here by no means constitute a complete SAP hardening guide, and only serve to address the issues described in my previous blog posts. In September 2010, SAP released a fairly comprehensive Netweaver security guide  taking into consideration attacks currently possible and further reading is highly recommended.
Ben Heinkel - 30th August 2011 This is the second in a series of posts about SAP infrastructure security, specifically related to RFC vulnerabilities and common misconfigurations that can be exploited by an attacker to gain unauthorised access to a SAP environment. In this post I will be demonstrating how some of the RFC vulnerabilities previously described can be exploited by the freely available, python based ERP penetration testing platform – Bizploit. Bizploit  is a free framework released by Onapsis, which currently includes numerous tools for SAP vulnerability assessment and exploitation.
Ben Heinkel - 6th April 2011 In this series of posts I aim to cover in depth some of the publically known infrastructure vulnerabilities that affect SAP (which stands for "Systems, Applications and Products in Data Processing") systems, how to use public domain tools to test your current deployments for these issues and how best to address them. While the industry is slowly taking note of SAP related security beyond segregation of duties, there is still a significant lack of awareness of vulnerabilities and attacks against SAP systems, which prompted this series of posts.
...is just that, a collection of handy bookmarks I initially collected that aid me in my day to day work or I find in the course of research.
This article is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing. The initial contents of this article were donated to OWASP by RSnake, from his seminal XSS Cheat Sheet, which was at: http://ha.ckers.org/xss.html . That site now redirects to its new home here, where we plan to maintain and enhance it. The very first OWASP Prevention Cheat Sheet, the XSS (Cross Site Scripting) Prevention Cheat Sheet , was inspired by RSnake's XSS Cheat Sheet, so we can thank him for our inspiration. We wanted to create short, simple guidelines that developers could follow to prevent XSS, rather than simply telling developers to build apps that could protect against all the fancy tricks specified in rather complex attack cheat sheet, and so the OWASP Cheat Sheet Series was born. This cheat sheet is for people who already understand the basics of XSS attacks but want a deep understanding of the nuances regarding filter evasion.
NTRUSign , also known as the NTRU Signature Algorithm , is a public key cryptography digital signature algorithm based on the GGH signature scheme .
Organisations/Conferences | IT Security
Certifications | IT Security
Training/Learning | IT Security
Tools | IT Security
Hackables/CTF/Games/Etc | IT Security
Mobile/iOS/Android/Etc | IT Security
Wireless | IT Security
Blogs/Podcasts/Etc | IT Security
IT Security | Books
Security/Authentication | Technology Topics