
If you haven’t had a chance to read through any of the 2015 reports yet, I’d highly suggest taking some time to do so. The data presented in these reports is highly valuable to any information security professional, and it really gives a clear overview of how the field is changing year by year. Two […]

Someone once said that “no security hole is too small”. The longer you work in the information security field, the more relevant this becomes. So many times, it’s been shown that the tiniest details can lead to massive data breaches. The 2013 Target breach is a prime example. Attackers first broke into Targets network on […]

When it comes to cross-site scripting, we want to find those script injection points that are frequently overlooked. A common source of stored cross-site scripting vulnerabilities is the file upload. Not only can we store a script in the application, but this script may be downloaded by other users. When we first explorer our application, […]

I think an attack vector that is often under-analyze is the web service. There’s no user interface, so what’s the real danger? Cross-Site Scripting (which accounts for about 53% of all application vulnerabilities) is completely useless since there is no HTML response. And how would one even use this tool without a user interface? Well, […]

Nearly every application relies on some type of data store, whether it’s a user database or a database of information related to the website. Without proper sanitation of inputs, these stores can be vulnerable to SQL injections, and attackers may be able to retrieve critical information with our permission. If you don’t have an understanding […]

ClickJacking Clickjacking is the malicious technique of tricking a user into clicking on something different than what the user intends to click on. This can result in confidential information being revealed or taking control of the user’s browser. Embedded code or scripts can execute without a user’s knowledge by clicking on a button that appears […]

So you’ve just graduated (or maybe you’re just finishing school) and you’re wondering where to go from here. Graduate school is expensive and those student loans are coming in every month, how do you continue learning without paying tens of thousands of dollars every year? Certifications are a great path to take, and the best […]

As information security analysts, cross-site scripting usually means an alert box with some arbitrary number being shown on the screen. But the risk involved with these attacks is far more serious than an annoying little pop up. In 2009, Twitter became the victim of a cross-site scripting worm that exploited a stored cross-site scripting vulnerability. […]

Direct Access and Completely Unprotected Functionality In many cases of broken access controls, sensitive functionality and resources can be accessed by anyone who knows the relevant URL. Some applications may enforce access controls by simply not displaying the usable link or button to access the resource. To effectively scan for these weaknesses, first open an […]