Advanced JS Deobfuscation Via AST and Partial Evaluation (Google Talk WrapUp)
The following post is a wrap up of a presentation I made for Google thanks to a very interesting initiative to meet web security researchers and Google security engineers - Thanks for the opportunity,...
View ArticleSoftware Security in practice
Last week I did a talk at the AIEA Turin Chapter on Software Security in Practice.I started the talk asking some key questions:- What is Secure Software?- How can a Company manages the security of the...
View ArticleReliable OS Shell with - EL [ Expression Language ] - Injection
Abusing EL for executing OS CommandsExpression Language injection Wow! It may lead to remote command execution on modern Servlet environments. This was pointed out by Dan Amodio in 2012 with his art...
View ArticleRequest parameter "_method" may lead to CakePHP CSRF Token Bypass
In CakePHP we noticed that under certain circumstances is it possible to bypass the built-in security checks offered by CSRF and anti-tampering.As stated in the official documentation "By using the...
View ArticleRAT WARS 2.0: Advanced Techniques for Detecting RAT Screen Control
In the landscape of web maliciousness Remote Administration Trojans [1] are not a new trend but their usage is still strong and growing steady. At its core a RAT is a backdoor facility used to let an...
View ArticleRCE in Oracle NetBeans Opensource Plugins: PrimeFaces 5.x Expression Language...
PrimeFaces is a open sourceUser Interface (UI) component library for JavaServer Faces (JSF) based applications, since its release, PrimeFaces has been strongly supported by Oracle, particularly within...
View ArticleOWASP Summit 2017: what's new?
Last week we attended the OWASP Summit 2017in Woburn Forest Center Parcs near London.The OWASP Summit 2017 was a 5-days participant driven event, dedicated to the collaboration of Development and...
View ArticleJavaScript Security Evolution talk at OWASP Taiwan Week 2017
In this presentation are explained the modern improvements in JavaScript and Client (Browser) security features. Still, the increase of complexity in XSS attacks and vulnerabilities is driving the...
View ArticleDOM Based Cross-Site Scripting in Google VRView library
While testing the VRView web application we discovered a DOM Based Cross-Site Scripting Vulnerability in the handling of errors through an inappropriate use of the "innerHTML"property. The use of this...
View ArticleShhlack, message encryption for Slack
A common problem about centralized messaging solutions is the sharing of sensitive information during day by day use, preserving, at the same time, message integrity and privacy.Sometimes two parties...
View ArticleAntitamper Mobile - Minded Security's Magik Quadrant for Mobile Code...
Minded Security's Magik Quadrant for Mobile Code Protection shows our evaluation of the top vendors in this market, based on our research and experience, updated to 2018.Magik Quadrant Why care about...
View ArticleMicroservices Security: Dos and Dont's
Last week we were invited as speakers by a very big enterprise for an internal event/conference and we decided to present an analysis of the most interesting issues on microservices we found in the...
View ArticlePentesting IoT devices (Part 1: Static Analysis)
IntroductionIntelligent dishwashers, smart factories, connected sensors and Wi-Fi fridges, these are only a few examples of everyday objects that now are connected to the Internet.All these "brainless"...
View ArticleA practical guide to testing the security of Amazon Web Services (Part 1: AWS...
Back in the days, the word Amazon used to refer to over half of earth's rainforests. While this is still true, it isn't what most people think of when they hear the word Amazon. Nowadays, people refer...
View ArticleA practical guide to testing the security of Amazon Web Services (Part 2: AWS...
td { border: 1px solid; padding:5px; } table{ border-collapse: collapse; } This is Part 2 of 3 on our practical guide to testing the security of Amazon Web Services. We are tackling the main services...
View ArticlePentesting IoT devices (Part 2: Dynamic Analysis)
This is the second part of our Pentesting IoT devices guide. In the previous post it was provided an overview on firmware static analysis showing how it can help to find many security issues. In this...
View ArticleFrom Path Traversal to Source Code in Asp.NET MVC Applications
@page { margin: 0.79in } p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2 } p.western { so-language: en-US } IntroductionModel-View-Controller web...
View ArticleHow to prevent Path Traversal in .NET
IntroductionA well-known, never out of fashion and highly impact vulnerability is the Path Traversal. This technique is also known as dot-dot-slash attack (../) or as a directory traversal, and it...
View ArticleSecure Development Lifecycle: the SDL value evolution. Part 1
Observability and metrics paradoxIt is also about observability: ”If a tree falls in a forest and no one is around to hear it, does it make a sound?” …or… What is the return value (in dollars number)...
View ArticleSecure Development Lifecycle: the SDL value evolution. Part 2
Evolution of SDL practices: from custom to product to serviceThe increasing visibility trend discussed in Part 1, of course, is impacting the current cybersecurity practices, in terms of maturity of...
View Article