At this point, I think it’s a relatively well known fact that passwords should be hashed in storage.  If you or your development teams are storing passwords in plain text, the keys to every user’s kingdom are sitting there begging to be stolen.  Really, all it takes is one little SQL injection to expose every user’s password […]

If you haven’t had a chance to read through any of the 2015 reports yet, I’d highly suggest taking some time to do so.  The data presented in these reports is highly valuable to any information security professional, and it really gives a clear overview of how the field is changing year by year.  Two […]

I don’t know about you guys, but I’m constantly on Amazon looking for new books to read.  I’ve managed to acquire a decent collection of books and read through the majority of them.  I figured I’d share a few of my favorites, and give a little insight on each of them. The Web Application Hacker’s […]

I think an attack vector that is often under-analyze is the web service.  There’s no user interface, so what’s the real danger? Cross-Site Scripting (which accounts for about 53% of all application vulnerabilities) is completely useless since there is no HTML response.  And how would one even use this tool without a user interface? Well, […]

ClickJacking Clickjacking is the malicious technique of tricking a user into clicking on something different than what the user intends to click on.  This can result in confidential information being revealed or taking control of the user’s browser.  Embedded code or scripts can execute without a user’s knowledge by clicking on a button that appears […]

So you’ve just graduated (or maybe you’re just finishing school) and you’re wondering where to go from here.  Graduate school is expensive and those student loans are coming in every month, how do you continue learning without paying tens of thousands of dollars every year? Certifications are a great path to take, and the best […]

As information security analysts, cross-site scripting usually means an alert box with some arbitrary number being shown on the screen.  But the risk involved with these attacks is far more serious than an annoying little pop up.  In 2009, Twitter became the victim of a cross-site scripting worm that exploited a stored cross-site scripting vulnerability. […]

Direct Access and Completely Unprotected Functionality In many cases of broken access controls, sensitive functionality and resources can be accessed by anyone who knows the relevant URL.  Some applications may enforce access controls by simply not displaying the usable link or button to access the resource. To effectively scan for these weaknesses, first open an […]