Web Application Security Mode:
(Page 1 of 330)  1 2 3 4 5 6 7 8 9 10 11  Next >
OWASP ZAP 2.3.0 2014-04-10
psiinon (psiinon gmail com)
Hi folks,

OWASP ZAP 2.3.0 is now available :
http://code.google.com/p/zaproxy/wiki/Downloads?tm=2

Quick summary of the main changes:

* A ZAP 'lite' version in addition to the existing 'full' version
* View, intercept, manipulate, resend and fuzz client-side (browser) events
* Enhanced authenticat

[ more ]  [ reply ]
Re: Web Application Vulnerability Categorization 2014-04-02
m@d m0nk (th3madm0nk gmail com)
Thank you guys - got the idea.

On Wed, Apr 2, 2014 at 7:10 PM, Eric Schultz <fire0088 (at) gmail (dot) com [email concealed]> wrote:
> Its important to note that you described two different findings.
>
> 1. Password recovery is brute forcable. If you stuck with owasp, the broken
> auth catagory is the best fit. Check if your

[ more ]  [ reply ]
Re: Web Application Vulnerability Categorization 2014-04-02
Dave Ferguson (gmdavef gmail com)
In terms of OWASP Top Ten, yes - I would categorize it under Broken
Auth & Session Management.

Also, check out the OWASP cheat sheet on this topic for helpful
remediation advice.
https://www.owasp.org/index.php/Forgot_Password_Cheat_Sheet

Dave

On Tue, Apr 1, 2014 at 1:27 PM, Seth Art <sethsec@gma

[ more ]  [ reply ]
Re: Web Application Vulnerability Categorization 2014-04-01
Seth Art (sethsec gmail com)
m0nk,

This CWE fits pretty closely: CWE-640: Weak Password Recovery
Mechanism for Forgotten Password -
http://cwe.mitre.org/data/definitions/640.html

-Seth

On Tue, Apr 1, 2014 at 2:24 PM, Seth Art <sethsec (at) gmail (dot) com [email concealed]> wrote:
> m0nk,
>
> This CWE fits pretty closely: CWE-640: Weak Password Recovery

[ more ]  [ reply ]
Web Application Vulnerability Categorization 2014-04-01
m@d m0nk (th3madm0nk gmail com)
Hello Team,

Greetings!!!.

I have a web app with a password recovery option. There is a secret
question and if the user enters the correct answer to the secret
question, the username and password is provided to the user.

If the password recover page / module allows multiple tries
(brute-force and

[ more ]  [ reply ]
Administrivia: Excessive CC's 2014-03-15
Andrew van der Stock (vanderaj greebo net)
Hi there,

There's a really useful question that I've rejected (along with a
great answer) as the question has about one bazillion security lists
in the To list.

I'd love to publish more discussions here and revitalise the list, but
not by by accepting a massive DDoS mail loop in the making, or
req

[ more ]  [ reply ]
Hacking in Schools 2014-02-25
Pete Herzog (lists isecom org)
How to teach hacking in school and open up education:

https://opensource.com/education/14/2/teach-hacking-schools-open-educati
on

Sincerely,
-pete.

--
Pete Herzog - Managing Director - pete (at) isecom (dot) org [email concealed]
ISECOM - Institute for Security and Open Methodologies

Need impartial, expert advice? Request a

[ more ]  [ reply ]
Google XXE Vulnerability 2014-02-21
Mark Litchfield (mark securatary com)
Hi All,

There was an XML external entity vulnerability within Googles Public
data explorer. This was submitted to Google as part of their Bug Bounty
Program.

For the full write up with screen shots -
http://www.securatary.com/vulnerabilities

--
All the best

Mark Litchfield
http://www.secura

[ more ]  [ reply ]
44CON 2014 September 11th - 12th CFP Open 2014-02-21
Steve (steve 44con com)
44CON is the UK's largest combined annual Security Conference and
Training event. Taking place on the 11th and 12th of September at the
ILEC Conference Centre near Earls Court, London, we will have a fully
dedicated conference facility, including catering, private bar and daily
Gin O?Clock break

[ more ]  [ reply ]
PHP wrapper question 2014-02-18
Mark Litchfield (mark securatary com)
Reaching out for some help / ideas.

I have an XXE that works but when processing large files it fails

For example, the below attack will work sending to my instance of Netcat
the base64 encoded string of win.ini. A nice POC, but not exactly what
I am looking. (We are using base64 to ensure any

[ more ]  [ reply ]
Shopify (Bug Bounty) - XML External Entity Vulnerability 2014-02-17
Mark Litchfield (mark securatary com)
Shopify suffered from an XXE attack within their online stores domain -
*.myshopify.com

They were extremely quick in confirming and fixing the issue (even
though it was a Sunday).

Full details with the usual screen shots can be found at
http://www.securatary.com

--
All the best

Mark Litchfie

[ more ]  [ reply ]
OWASP Xenotix XSS Exploit Framework V5 Released 2014-02-13
Ajin Abraham (ajin25 gmail com)
Hello,
Happy Valentines day wishes. I am glad to inform that, OWASP
Xenotix XSS Exploit Framework V5 is Released.

OWASP Xenotix XSS Exploit Framework is an advanced Cross Site
Scripting (XSS) vulnerability detection and exploitation framework. It
provides Zero False Positive scan results wit

[ more ]  [ reply ]
Ebay, Inc Bug Bounty - GoStoreGo Administrative Authentication Bypass to all online stores 2014-02-12
Mark Litchfield (mark securatary com)
This attack allowed for a cross store (so essentially unauthenticated,
as we have not authenticated to our target store) privilege escalation
attack creating an administrative user on any *.gostorego.com store.

As indicated by their own website, there are over 200,000 active
stores.This attack a

[ more ]  [ reply ]
International Journal of Distributed Sensor Networks (IF 0.727): Special Issue on Research Advances in Security and Privacy for Smart Cities 2014-02-09
Georgios Kambourakis (gkamb aegean gr)
[My apologies if you receive multiple copies of this message.]

Call for articles for International Journal of Distributed Sensor
Networks (IF 0.727)

Special Issue on
Research Advances in Security and Privacy for Smart Cities

http://www.hindawi.com/journals/ijdsn/si/239803/cfp/

Security for smar

[ more ]  [ reply ]
Damn Vulnerable IOS App v1.0 launched 2014-02-04
Prateek Gianchandani (prateek searchingeye gmail com)
Hi All,

It gives me great pleasure to announce v1.0 of Damn Vulnerable IOS =

Application http://damnvulnerableiosapp.com

Damn Vulnerable IOS App (DVIA) is an IOS application that is damn =

vulnerable. Its main goal is to provide a platform to mobile security =

enthusiasts/professionals or stu

[ more ]  [ reply ]
SmarterMail All Versions - Stealing other Users Emails 2014-02-03
Mark Litchfield (mark securatary com)
This attack allows an authenticated SmarterMail user to read other users
emails.

I tried to contact Smartmail with the usual security email aliases,
apparently they do not have any. I posted to their forum for a contact
and all I got was an email stating check you are running the latest
versio

[ more ]  [ reply ]
RE: Smarter Mail All Versions - Privilege Escalation 2014-02-04
Martin O'Neal (martin oneal corsaire com)

> Maybe they should consider a more different
> approach to people trying to report security issues

Hi Mark,

These probably don't need to be cross posted to all the lists. How about jut keeping it to bugtraq where most people drop their vulns?

Martin...

This list is sponsored by Cenzic
--

[ more ]  [ reply ]
Smarter Mail All Versions - Privilege Escalation 2014-02-03
Mark Litchfield (mark securatary com)
This attack will allow a regular SmarterMail user to elevate their
privileges to Domain Administrator.

I tried to contact Smartmail with the usual security email aliases,
apparently they do not have any. I posted to their forum for a contact
and all I got was an email stating check you are runn

[ more ]  [ reply ]
Ektron CMS TakeOver Part (2) - PaylPal-Forward.com demonstration 2014-02-03
Mark Litchfield (mark securatary com)
As previously stated, I would post an update for Ektron CMS bypassing
the security fix.

A full step by step with the usual screen shots can be found at -
http://www.securatary.com/vulnerabilities

In this example, we use www.paypal-forward.com as a demonstration site.
I would like to say that P

[ more ]  [ reply ]
Ektron CMS Take Over - Hijacking Accounts 2014-01-30
Mark Litchfield (mark securatary com)
I have detailed a vulnerability within Ektron CMS that allows an
unauthenticated user to hijack any account. The clear targets of choice
for this CMS would be the builtin or admin account.

Whilst I found this issue back in 2012, it appears that around 65% are
still vulnerable and should be patc

[ more ]  [ reply ]
Yahoo SiteBuilder RCE 2014-02-01
Mark Litchfield (mark securatary com)
Full details posted at http://www.securatary.com/vulnerabilities with
the usual screen shots.

Apparently this vulnerability never existed the POC now produces a 404,
nothing to do with the fact that it has already been fixed of course.

I hope other researchers are not experiencing the same type

[ more ]  [ reply ]
Vulnerabilities within Mura CMS / Sitecore MCS / SmarterMail 2014-01-28
Mark Litchfield (mark securatary com)
These vulnerabilities allow for a complete take over giving full
administrative access as well as remote shells on the servers that they
are installed on.

Each of these suffer from Insecure Direct Object Reference Vulnerabilities.

Due to the details of the attack and screen shots, they can be fo

[ more ]  [ reply ]
nullcon Blackshield Awards 2014 2014-01-10
nullcon (nullcon nullcon net)
Dear All,

Its the time of the year, while we all are busy fighting against the
dark side of the cyber world, contributing our bits and bytes to make
the world a better & secure place, keeping our skills and armours
shining to defend against the Darks Arts, to take a pause and reflect
back.

Lets ta

[ more ]  [ reply ]
SpiderFoot 2.1.0 released 2014-01-05
Steve Micallef (steve binarypool com)
Hi everyone,

SpiderFoot 2.1.0 is now available, a major update over 2.0.5 which was
released back in September.

Major improvements are as follows:

- Identifies sites co-hosted on IPs of your target.
- Checks whether your target, affiliates or co-hosts have a bad
reputation (PhishTank, Google

[ more ]  [ reply ]
CFP - IEEE Co-sponsored CyberSec2014 - Lebanon Section 2014-01-01
The Third International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (cyb2014 sdiwc net)
All the registered papers will be submitted to IEEE for potential
inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I)
databases.

TITLE: The Third International Conference on Cyber Security, Cyber
Warfare, and Digital Forensic (CyberSec2014)

EVENT VENUE: Lebanese University, Le

[ more ]  [ reply ]
Arachni v0.4.6-0.4.3 has been released (Open Source Web Application Security Scanner Framework) 2014-01-01
Tasos Laskos (tasos laskos gmail com)
Hey folks,

There's a new version of Arachni, an Open Source, modular and
high-performance Web Application Security Scanner Framework written in Ruby.

Brief list of changes:

Framework
----------
* Massively decreased RAM consumption.
* Amount of performed requests cut down by 1/3 -- and thus 1/3 d

[ more ]  [ reply ]
DEFCON DCG Kerala Information Security Meet 2014 CFP is Open Now. 2013-12-27
Ajin Abraham (ajin25 gmail com)
About DEFCON DCG Kerala
=================

Defcon DCG Kerala (DC0497) is a Defcon USA Registered group for
promoting and demonstrating research and development in the field of
Information Security. We are a group of Information Security
Enthusiasts actively interested in promoting information securi

[ more ]  [ reply ]
WebSurgery v1.1 released (Web application security testing suite) 2013-11-11
John Stamatakis (srgn ml googlemail com)
Overview
========
Sunrise is proudly announces WebSurgery v1.1!

WebSurgery is a suite of tools for security testing of web applications. It
is designed to address the ongoing needs of security auditors so to
facilitate them with web application planning and exploitation. Suite
currently contains a

[ more ]  [ reply ]
[CVE-2013-2751, CVE-2013-2752] NETGEAR ReadyNAS Remote Root 2013-10-22
Craig Young (vuln-report secur3 us)
NETGEAR ReadyNAS with firmware 4.2.x before 4.2.24 and 4.1.x before
4.1.12 is prone to command injection from an unauthenticated HTTP GET
request. This vulnerability can lead to complete root access as
outlined on the Tripwire blog:
http://www.tripwire.com/state-of-security/vulnerability-management

[ more ]  [ reply ]
Re: OWASP Vulnerable Web Applications Directory Project 2013-10-18
psiinon (psiinon gmail com)
And in converting my original email to text format the link got lost ;)

The project is here:
https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Direct
ory_Project

Simon

On Fri, Oct 18, 2013 at 4:04 PM, psiinon <psiinon (at) gmail (dot) com [email concealed]> wrote:
> The OWASP Vulnerable Web Applications Direct

[ more ]  [ reply ]
(Page 1 of 330)  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus