Mastodon

Security

A 411-post collection

Everything you need to know about the Shellshock Bash bug

This content is now available in the Pluralsight course "Understanding the Shellshock Bash Bug" [http://www.pluralsight.com/courses/shellshock-bash-bug]Remember Heartbleed [https://www.troyhunt.com/2014/04/everything-you-need-to-know-about.html]? If you believe the hype today, Shellshock is in that league and with an equally awesome name albeit bereft of a cool logo (someone in the marketing department of these vulns needs to get on that). But in all seriousness, it does have the potential to be...

Introducing paste searches and monitoring for “Have I been pwned?”

I’ve got 174,451,409 breached accounts in Have I been pwned? [https://haveibeenpwned.com/] (HIBP) as of today which probably sounds like a lot, but it’s not. Why is it not a lot? Because whilst that list spans a lot of the big breaches I could get my hands on, as of the middle of this year (now a couple of months ago already), there were over half a billion accounts breached in just six months [https://www.riskbasedsecurity.com/2014/08/hacking-exposed-78-of-all-records-compromised-in-first-half-...

Solving the tyranny of HTTP 403 responses to directory browsing in ASP.NET

You may not know this, but an HTTP 403 response when browsing to an empty directory is a serious security risk. What the?! You mean if I go to my website which has a “scripts” folder where I put all my JavaScript and I have directory browsing disabled (as I rightly should) and the server returns a 403 “Forbidden” (which it rightly should), I’m putting my internet things at risks of being pwned?! Yes, because it discloses the presence of a folder called “scripts” which is a common directory. W...

What the f*** were they thinking?! Crazy website biases exposed by naughty words lists (the NSFW version)

I’ve long held the view that passwords should consist of as many crazy things as the owner deems fit. If I want to create a password that looks like a dog just ate the keyboard and threw up all the keys, then good for me. (Chances are that Fido is going to cough up a pretty unique password too but before PETA gets on my case, try using a password manager like 1Password [https://www.troyhunt.com/2011/03/only-secure-password-is-one-you-cant.html] instead.) Now I’m used to seeing all sorts of ridi...

Hack Your API First – learn how to identify vulnerabilities in today’s internet connected devices with Pluralsight

A few years ago I was taking a look at the inner workings of some mobile apps on my phone. I wanted to see what sort of data they were sending around and as it turned out, some of it was just not the sort of data that should ever be traversing the interwebs in the way it was. In particular, the Westfield iPhone app to find your car caught my eye [https://www.troyhunt.com/2011/09/find-my-car-find-your-car-find.html]. A matter of minutes later I had thousands of numberplates for the vehicles in th...

Automating web security reviews with Netsparker

I will not run web security analysers without first understanding web security. I will not run web security analysers without first understanding web security. I will not run web security analysers without first understanding web security. Are we clear now? Good, because as neat as tools like I’m about to discuss are, nothing good comes from putting them in the hands of people who can’t properly interpret the results and grasp the concepts of what dynamic analysis scanners can and cannot cover....

Security Insanity with RunAs Radio

I know I’ve shared this a number of times now, but no matter how much I see it, it still cracks me up: [https://www.troyhunt.com/2012/07/lessons-in-website-security-anti.html] Make sense? Of course it doesn’t and therein lies the insanity of it all! But let us not single out Tesco alone, there are plenty of British companies that construct responses like this (sorry English people, I don’t know why, they just seem to feature disproportionately to the rest of the world). In fact earlier this w...

InfoSec Insanity: Sharing the crazy for the betterment of online security

I was getting a little fed up with the craziness I kept seeing on the web when it comes to security, so I created this: [http://lh3.ggpht.com/-nAoaSvA-cZE/U_r33Cj89lI/AAAAAAAAHAc/TYQYwW3Kz_Q/s1600-h/Logo24.png] That’s right, a great big freakin’ padlock with a straightjacket or more to the point, I created the Twitter account @InfoSecInsanity [https://twitter.com/InfoSecInsanity]. So what exactly is InfoSec Insanity? We’ll let’s take this example from the weekend on restricting passwords wh...

Too much soft cheese may directly impact your health insurance premiums

We’ve become accustomed to the whole idea of us being electronically tracked based on our various personal habits. In fact just the other day I was asking online about Bose headphones, did a couple of searches then next thing I knew, my own blog was plugging them to me: But again, we’ve got a bit of a sense of tracking cookies now and that the same ad networks operate across seemingly independent websites therefore providing the ability to track and target information. Ratchet up the tracki...

DDD Melbourne, hackers and gentlemen's parts

A couple of Saturdays back I spent a day down in Melbourne at DDD [http://www.dddmelbourne.com/] doing the usual combination of showing people some of the ridiculous stuff we’re doing on the net in relation to privacy, how we as developers are building some woefully insecure apps and generally making everyone depressed about the state of web. I do mean that in a constructive way though and indeed that’s the entire premise behind the Hack Yourself First courses I’ve been writing [http://pluralsig...