Quantcast
Channel: IMQ Minded Security Blog
Browsing all 83 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Advanced JS Deobfuscation Via AST and Partial Evaluation (Google Talk WrapUp)

The following post is a wrap up of a presentation I made for Google thanks to a very interesting initiative to meet web security researchers and Google security engineers - Thanks for the opportunity,...

View Article


Image may be NSFW.
Clik here to view.

Software Security in practice

Last week I did a talk at the AIEA Turin Chapter on Software Security in Practice.I started the talk asking some key questions:- What is Secure Software?- How can a Company manages the security of the...

View Article


Reliable OS Shell with - EL [ Expression Language ] - Injection

Abusing EL for executing OS CommandsExpression Language injection Wow! It may lead to remote command execution on modern Servlet environments. This was  pointed out by Dan Amodio in 2012 with his art...

View Article

Request parameter "_method" may lead to CakePHP CSRF Token Bypass

In CakePHP we noticed that under certain circumstances is it possible to bypass the built-in security checks offered by CSRF and anti-tampering.As stated in the official documentation "By using the...

View Article

Image may be NSFW.
Clik here to view.

RAT WARS 2.0: Advanced Techniques for Detecting RAT Screen Control

In the landscape of web maliciousness Remote Administration Trojans [1] are not a new trend but their usage is still strong and growing steady. At its core a RAT is a backdoor facility used to let an...

View Article


RCE in Oracle NetBeans Opensource Plugins: PrimeFaces 5.x Expression Language...

PrimeFaces is a open sourceUser Interface (UI) component library for JavaServer Faces (JSF) based applications, since its release, PrimeFaces has been strongly supported by Oracle, particularly within...

View Article

Image may be NSFW.
Clik here to view.

OWASP Summit 2017: what's new?

Last week we attended the OWASP Summit 2017in Woburn Forest Center Parcs near London.The OWASP Summit 2017 was a 5-days participant driven event, dedicated to the collaboration of Development and...

View Article

JavaScript Security Evolution talk at OWASP Taiwan Week 2017

In this presentation are explained the modern improvements in JavaScript and Client (Browser) security features. Still, the increase of complexity in XSS attacks and vulnerabilities is driving the...

View Article


Image may be NSFW.
Clik here to view.

DOM Based Cross-Site Scripting in Google VRView library

While testing the VRView web application we discovered a DOM Based Cross-Site Scripting Vulnerability in the handling of errors through an inappropriate use of the "innerHTML"property. The use of this...

View Article


Image may be NSFW.
Clik here to view.

Shhlack, message encryption for Slack

A common problem about centralized messaging solutions is the sharing of sensitive information during day by day use, preserving, at the same time, message integrity and privacy.Sometimes two parties...

View Article

Image may be NSFW.
Clik here to view.

Antitamper Mobile - Minded Security's Magik Quadrant for Mobile Code...

Minded Security's Magik Quadrant for Mobile Code Protection shows our evaluation of the top vendors in this market, based on our research and experience, updated to 2018.Magik Quadrant Why care about...

View Article

Image may be NSFW.
Clik here to view.

Microservices Security: Dos and Dont's

Last week we were invited as speakers by a very big enterprise for an internal event/conference and we decided to present an analysis of the most interesting issues on microservices we found in the...

View Article

Image may be NSFW.
Clik here to view.

Pentesting IoT devices (Part 1: Static Analysis)

IntroductionIntelligent dishwashers, smart factories, connected sensors and Wi-Fi fridges, these are only a few examples of everyday objects that now are connected to the Internet.All these "brainless"...

View Article


Image may be NSFW.
Clik here to view.

A practical guide to testing the security of Amazon Web Services (Part 1: AWS...

Back in the days, the word Amazon used to refer to over half of earth's rainforests. While this is still true, it isn't what most people think of when they hear the word Amazon. Nowadays, people refer...

View Article

Image may be NSFW.
Clik here to view.

A practical guide to testing the security of Amazon Web Services (Part 2: AWS...

td { border: 1px solid; padding:5px; } table{ border-collapse: collapse; } This is Part 2 of 3 on our practical guide to testing the security of Amazon Web Services. We are tackling the main services...

View Article


Image may be NSFW.
Clik here to view.

Pentesting IoT devices (Part 2: Dynamic Analysis)

This is the second part of our Pentesting IoT devices guide. In the previous post it was provided an overview on firmware static analysis showing how it can help to find many security issues. In this...

View Article

Image may be NSFW.
Clik here to view.

From Path Traversal to Source Code in Asp.NET MVC Applications

@page { margin: 0.79in } p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2 } p.western { so-language: en-US } IntroductionModel-View-Controller web...

View Article


How to prevent Path Traversal in .NET

IntroductionA well-known, never out of fashion and highly impact vulnerability is the Path Traversal. This technique is also known as dot-dot-slash attack (../) or as a directory traversal, and it...

View Article

Image may be NSFW.
Clik here to view.

Secure Development Lifecycle: the SDL value evolution. Part 1

Observability and metrics paradoxIt is also about observability: ”If a tree falls in a forest and no one is around to hear it, does it make a sound?” …or… What is the return value (in dollars number)...

View Article

Image may be NSFW.
Clik here to view.

Secure Development Lifecycle: the SDL value evolution. Part 2

Evolution of SDL practices: from custom to product to serviceThe increasing visibility trend discussed in Part 1, of course, is impacting the current cybersecurity practices, in terms of maturity of...

View Article
Browsing all 83 articles
Browse latest View live