InfoSec

/InfoSec

What is DLL Hijacking?

DLL Hijacking is a way for attackers to execute unexpected code on your machine. This means that if an attacker can get a file on your machine (by social engineering, remote control, etc.)  that file could be executed when the user runs an application that is vulnerable to DLL Hijacking. To understand how it works, you [...]

By | October 19th, 2016|Categories: InfoSec|Tags: |0 Comments

Referer Redirection and Its Inconspicuous Danger

Referer Redirection and Its Inconspicuous Danger Recently I noticed some peculiar behavior on web application. I observed that in certain situations, the webpage would openly redirect to the ‘Referer’ header defined in the request. In this particular instance, the web application required some data from the user to perform that page’s function. When that data was not present, [...]

By | August 23rd, 2016|Categories: InfoSec, Vulnerabilities|0 Comments

Cross-Site Request Forgery Cheat Sheet

Cross-Site Request Forgery Cheat Sheet The Cross-Site Request Forgery (CSRF) Cheat Sheet is a flowchart that is designed to cover the common scenarios that an experienced application penetration tester would test for in CSRF testing. It should be most useful for newer penetration testers who don't have a comprehensive understanding of CSRF testing, although it should [...]

By | April 3rd, 2016|Categories: InfoSec|0 Comments

Can’t Hack a Hacker: Reverse Engineering a Discovered ATM Skimmer

Can't Hack a Hacker: Reverse Engineering a Discovered ATM Skimmer Background When traveling, Elizabeth and I are always a little bit extra cautious; we hide money in special belts, we carry emergency cards in 3 separate places, we never withdraw more than $100 from the ATM. One precaution Elizabeth always takes, is covering [...]

By | March 31st, 2016|Categories: InfoSec|64 Comments

Shells in Your Serial – Exploiting Java Deserialization on JBoss

Shells in Your Serial - Exploiting Java Deserialization on JBoss Background I read a fantastic write-up by Stephen Breen of FoxGlove Security earlier this month describing a vulnerability, present in several common Java libraries, related to the deserialization of user input. His post goes fairly in depth into how the vulnerability works, so [...]

By | November 18th, 2015|Categories: InfoSec|5 Comments

Practical Guide to exploiting the unquoted service path vulnerability in Windows

Practical Guide to exploiting the unquoted service path vulnerability in Windows What is the unquoted service path vulnerability in Windows? When a service in Windows is started, Windows has to try to find it. Usually, this is an easy task because the path is well-defined and contained in quotation marks. Like this example [...]

By | September 10th, 2015|Categories: InfoSec|1 Comment

Exploiting .NET Padding Oracle Attack MS10-070 (CVE-2010-3332) and Bypassing Microsoft’s Workaround

Exploiting .NET Padding Oracle Attack MS10-070 (CVE-2010-3332) and Bypassing Microsoft's Workaround This post was originally writen in October of 2010, and has been lightly updated in 2015. This week I ran into my first ASP.NET site since MS10-070.  I had read Bryan Holyfield and Giorgio Fedon's posts, which were great posts with groundbreaking information, although it was [...]

By | April 20th, 2015|Categories: InfoSec|0 Comments

Browser URL Encoding Decoding and XSS

Browser URL Encoding Decoding and XSS This article was originally written in early 2010, and has been lightly updated in 2015. Cross-site scripting attacks can be difficult to reproduce because of browser issues.  This problem is exacerbated by the fact that there is very little information regarding URL encoding and decoding.  Hopefully this will help [...]

By | April 20th, 2015|Categories: InfoSec|0 Comments

TrustFoundry at TriKC 0x01

TrustFoundry at TriKC 0x01 On November 12th, TrustFoundry will be competing at TriKC 0x01 in Overland Park, KS.  Come see Matt South present on finding vulnerabilities using grey-box PHP analysis, and Alex Lauerman present on using software defined radio to find weaknesses in proprietary communication protocols.  More info and registration can be found at http://trikc.seckc.org.  

By | November 9th, 2014|Categories: InfoSec|0 Comments

TrustFoundry at BlackHat USA 2014

TrustFoundry at BlackHat USA 2014 TrustFoundry will be at BlackHat USA 2014 showing the Burp Suite application security tool that we co-wrote, BReWSki.  If you will be attending, or come see our presentation!

By | July 20th, 2014|Categories: InfoSec|0 Comments