Shells in Your Serial - Exploiting Java Deserialization on JBoss Background I read a fantastic write-up by Stephen Breen of FoxGlove Security earlier this month describing a vulnerability, present in several common Java libraries, related to the deserialization of user input. His post goes fairly in depth into how the vulnerability works, so [...]
Practical Guide to exploiting the unquoted service path vulnerability in Windows What is the unquoted service path vulnerability in Windows? When a service in Windows is started, Windows has to try to find it. Usually, this is an easy task because the path is well-defined and contained in quotation marks. Like this example [...]
Exploiting .NET Padding Oracle Attack MS10-070 (CVE-2010-3332) and Bypassing Microsoft's Workaround This post was originally writen in October of 2010, and has been lightly updated in 2015. This week I ran into my first ASP.NET site since MS10-070. I had read Bryan Holyfield and Giorgio Fedon's posts, which were great posts with groundbreaking information, although it was [...]
Browser URL Encoding Decoding and XSS This article was originally written in early 2010, and has been lightly updated in 2015. Cross-site scripting attacks can be difficult to reproduce because of browser issues. This problem is exacerbated by the fact that there is very little information regarding URL encoding and decoding. Hopefully this will help [...]
TrustFoundry at TriKC 0x01 On November 12th, TrustFoundry will be competing at TriKC 0x01 in Overland Park, KS. Come see Matt South present on finding vulnerabilities using grey-box PHP analysis, and Alex Lauerman present on using software defined radio to find weaknesses in proprietary communication protocols. More info and registration can be found at http://trikc.seckc.org. [...]
TrustFoundry at BlackHat USA 2014 TrustFoundry will be at BlackHat USA 2014 showing the Burp Suite application security tool that we co-wrote, BReWSki. If you will be attending, or come see our presentation!
Building a Presentation Recording Setup After seeing countless great presentations at SecKC, it was clear that a recording setup was needed to capture the wonderful content so it could be leveraged by others. I wanted to quickly document what we are using to record, in case it is helpful for others trying to record and distribute knowledge. [...]
Is Security Worth it? I have had a passion to determine the real impact that security has on business. After performing detailed quantitative analysis and modeling on a limited data set, we have determined the point at which breach impact is maximized. This research and analysis and a review of previous research will be discussed on May 13th at Secure [...]