Showing 18 results for: March 2012 ×

PenTest Manager: Now with Secure File Transfer

PenTest Manager, the cutting-edge reporting tool created by Trustwave SpiderLabs to manage, track, and report results of penetration tests, has been updated to include secure file transfer to simplify the testing process, where documents and other files need to be...

SpiderLabs Radio Podcast: March 2012

We have just released the SpiderLabs Radio March Edition. This show is packed with interviews from various members of the team who are speaking at a bunch of different conferences around the Globe in the next month. We also hear...

Upcoming SpiderLabs Speaking Events - March / April 2012

At Trustwave SpiderLabs we encourage our team members to frequently perform their own research and share the results both internally and externally. From external standpoint, we are frequently asked to speak at private closed-door events, but we also submit talks...

Dirty RAT Eats Nate's Banana

I've got a real treat for everyone today, as I received approval to blog about an interesting piece of malware I recently reversed as part of a client engagement. Obviously, due to the sensitive nature of this, I'll have to...

The Race for MS12-020

So if you missed our previous blog post on the MS Patch Tuesday earlier this week, or missed any of the several dozen news articles, there was a pretty serious hole patched up in the latest update from Redmond. Microsoft...

LIKE, omg!

If you read this blog, you might have seen my earlier post regarding my configurable SQL injection testbed, SQLol. It comes with challenges which I've seen some buzz about. In the latest version, there is a challenge involving use of...

SpiderLabs T-Shirt Designs 2006-2011

There is something about t-shirts that can bond a group of individuals, define a movement or mark milestones or events. Many of us will cherish those shirts long past their intended lifespan.

[Honeypot Alert] Zen Cart 'admin/sqlpatch.php' SQL Injection Attacks

Our web honeypot sensors picked up attacks aimed at exploiting a Zen Cart SQL Injection vulnerability. The attacks send a POST request to the following URLs: POST /admin/sqlpatch.php/password_forgotten.php?action=execute POST /black_market/admin/sqlpatch.php/password_forgotten.php?action=execute POST /cart/admin/sqlpatch.php/password_forgotten.php?action=execute POST /product_info.php/products_id/1658/admin/sqlpatch.php/password_forgotten.php?action=execute POST /shop/admin/sqlpatch.php/password_forgotten.php?action=execute POST /shopping/admin/sqlpatch.php/password_forgotten.php?action=execute POST /store/admin/sqlpatch.php/password_forgotten.php?action=execute...

[Honeypot Alert] Status Report for February 2012

Monthly Web Honeypot Status Report We have received a tremendous amount of positive feedback on our web-based honeypot alert blog posts. While we agree that this data is useful for raising awareness of individual attack details, we feel that what...

OWASP Virtual Patching Survey Results

In a previous blog post, we issued a call for assistance to help OWASP with a virtual patching survey. The survey was open for about 2 weeks and we received a pretty fair turnout as 44 organizations participated. Here are...

Virtual Patch for Movable Types XSS (CVE 2012-1262)

My SpiderLabs Research colleague Jonathan Claudius recently identified an XSS flaw in the Movable Types application which was outlined in Trustwave Security Advisory TWSL2012-003. Here is the quick overview of the issue: After extracting the Moveable Type CGI files and...