Showing 26 results for: June 2012 ×

Analyzing PDF Malware - Part 3B

Part 3B of a demonstration on analyzing malware embedded within a suspicious PDF document. This part specifically deals with static analysis of discovered shellcode.

eHarmony Password Dump Analysis

Unless you've been hauled up in a bunker, eating MREs and watching Doomsday Preppers marathons, you've likely heard of the recent compromise of over 1.5 million eHarmony password hashes. After a little work tracking down the hashes, we launched several...

Security Capture the Flag Competitions

Many people look at capture the flag competitions with varying reactions. Some look at them as ways for groups to show off. Others look at them with disdain wondering why someone would want to brag about the ability to break...

I Forgot Your Password

I'm now going into my second year in application security, and as I learn more and more, my favorite attacks are still some of the things I learned when I first began here in SpiderLabs. For example, using an application's...

Five E-Commerce Security Myths (Part 1)

Compromises of e-commerce websites are increasingly common. In our 2012 Global Security Report we reported that 20% of our incident response investigations related to e-commerce sites. This was up from 9% the year before. In my part of the world...

Five E-Commerce Security Myths (Part 2)

In part 1 of this series I gave an introduction into how most merchants accept payments and how most bad guys steal this data. In this post, I'm going to delve into the misconceptions about e-commerce security that we hear...

CVSS for Penetration Test Results (Part I)

Trustwave has been adding support for the Common Vulnerability Scoring System (CVSS) in PenTest Manager, our online reporting portal used for all SpiderLabs penetration tests. While this is a great step toward better metrics for our penetration test results, the...

Metasploit => tips, tricks, hashes and tokens

Metasploit is one of the many tools that can be used during a penetration test, and it actually consists of a whole suite of tools, that forms part of a complete attacking framework. Metasploit is not the best tool for...

Internet Explorer Vulnerabilities Gone Wild

It's a busy time for Internet Explorer: Patch Tuesday addressed quite a few issues in IE, and an additional advisory for a 0-day vulnerability which has been exploited in the wild, also in Internet Explorer, soon followed. Naturally, when IE...

ModSecurity and OWASP CRS Updates Available

Security Fix Release: ModSecurity v2.6.6 The ModSecurity Development Team has released version 2.6.6 in response to a multipart bypass vulnerability that was disclosed to us. Users are strongly encouraged to update. Please see the release notes included into CHANGES file....

Using Nmap to Screenshot Web Services

As part of Trustwave SpiderLabs network penetration testing team, I perform many internal penetration tests each year. As part of those tests, we see a lot of web servers. Some of those are internal portals like Sharepoint. Others are non-production...

MySQL/MariaDB: Trade You a Banana for Root Access?

Summary Over the weekend, an Authentication Bypass Vulnerability for MySQL and MariaDB (CVE-2012-2122) was released by Sergei Golubchik of Monty Program Ab (link). The vulnerability is trivial to exploit and has the potential to expose root user access to the...

Introducing CryptOMG

CryptOMG is CTF-style testbed for exploiting various flaws in cryptographic implementations. Cryptography is very easy to do incorrectly, which is pretty apparent throughout the web if you know what to look for. CryptOMG will help train your eye to look...

The Return of Zuc.A and and Ancient OSX Viruses?

A few weeks ago I caught a tweet from Chris Wysopal (@WeldPond) noticing how the new version of Microsoft Security Essentials had detected the Zuc.A virus on his machine. You might think that's really cool how Microsoft gives away free...

Zap(ped) into Foca(s)

An external penetration test isn't just about the network addresses to pwn, but sometimes about the web presence that is offered to the world at large. And web presence equals web applications. As a new addition to the SpiderLabs team,...

Discussions on Targeted Attacks

Even though targeted attacks performed by groups such as LulzSec and Anonymous has gotten less headlines recently, in general the number of targeted attacks in the past few months have increased. The motivation behinds such attacks vary; for instance, the...