When it comes to cross-site scripting, we want to find those script injection points that are frequently overlooked.  A common source of stored cross-site scripting vulnerabilities is the file upload.  Not only can we store a script in the application, but this script may be downloaded by other users.  When we first explorer our application, […]

I think an attack vector that is often under-analyze is the web service.  There’s no user interface, so what’s the real danger? Cross-Site Scripting (which accounts for about 53% of all application vulnerabilities) is completely useless since there is no HTML response.  And how would one even use this tool without a user interface? Well, […]

ClickJacking Clickjacking is the malicious technique of tricking a user into clicking on something different than what the user intends to click on.  This can result in confidential information being revealed or taking control of the user’s browser.  Embedded code or scripts can execute without a user’s knowledge by clicking on a button that appears […]

So you’ve just graduated (or maybe you’re just finishing school) and you’re wondering where to go from here.  Graduate school is expensive and those student loans are coming in every month, how do you continue learning without paying tens of thousands of dollars every year? Certifications are a great path to take, and the best […]

As information security analysts, cross-site scripting usually means an alert box with some arbitrary number being shown on the screen.  But the risk involved with these attacks is far more serious than an annoying little pop up.  In 2009, Twitter became the victim of a cross-site scripting worm that exploited a stored cross-site scripting vulnerability. […]

Direct Access and Completely Unprotected Functionality In many cases of broken access controls, sensitive functionality and resources can be accessed by anyone who knows the relevant URL.  Some applications may enforce access controls by simply not displaying the usable link or button to access the resource. To effectively scan for these weaknesses, first open an […]