Mastodon

Security

A 411-post collection

Talking with Scott Hanselman on honeypots, pineapples and SSL

For many of you, Scott Hanselman [http://www.hanselman.com/] will need no introduction and is a very familiar face, voice and writer. Among the many good things that Scott does to support the web development community (and that’s not just the Microsoft folks either), he’s also the man behind the Hanselminutes podcast [http://www.hanselminutes.com/372/are-you-secure-wifi-honeypots-pineapples-and-ssl-with-troy-hunt] which I was very happy to join him on recently. In fact this remains one of the v...

Your login form posts to HTTPS, but you blew it when you loaded it over HTTP

Here’s an often held conversation between concerned website user and site owner: User: “Hey mate, your website isn’t using SSL when I enter my password, what gives?!” Owner: “Ah, but it posts to HTTPS so your password is secure! We take security seriously. Our measures are robust.” (and other random, unquantifiable claims) Loading login forms over HTTP renders any downstream transport layer security almost entirely useless. Rather than just tell you what’s wrong with this, let me show precise...

Hack yourself first – how to go on the offence before online attackers do

The unfortunate reality of the web today is that you’re going to get hacked. Statistically speaking at least, the odds of you having a website without a serious security risk are very low – 14% according to WhiteHat’s State of Web Security [https://blog.whitehatsec.com/the-state-of-web-security/#.UY77SrVTDL9] report from a couple of weeks ago. Have enough websites for long enough (as many organisations do), and the chances of you getting out unscathed aren’t real good. There’s this great TEDx...

Clickjack attack – the hidden threat right in front of you

XSS protection: check! No SQL injection: check! Proper use of HTTPS: check! Clickjacking defences: uh, click what now?! This is one of those risks which doesn’t tend to get a lot of coverage but it can be a malicious little bugger when exploited by an attacker. Originally described by Jeremiah Grossman [http://jeremiahgrossman.blogspot.com.au/2008/10/clickjacking-web-pages-can-see-and-hear.html] of WhiteHat Security fame back in 2008, a clickjacking attack relies on creating a veneer of...

Here’s why you can’t trust SSL logos on HTTP pages (even from SSL vendors)

A couple of days ago I wrote about Why I am the world’s greatest lover (and other worthless security claims) [https://www.troyhunt.com/2013/05/why-i-am-worlds-greatest-lover-and.html] and it  really seemed to resonate with people. In short, whacking a seal on your website that talks about security awesomeness in no way causes security awesomeness. Andy Gambles gets that and shared this tweet with me: [https://twitter.com/andygambles/status/332065425485611008] So let’s check out exactly what’s...

Why I am the world’s greatest lover (and other worthless security claims)

I’ve been considering purchasing one of these t-shirts: This shirt would announce to everyone who crosses my path that I am, in fact, the world’s greatest lover. They would know this because I have a t-shirt that tells them so and it would give them enormous confidence in my sexual prowess. If ever I was challenged on the claim, I could quite rightly say that nobody has ever demonstrated that this is not the case and there are no proven incidents that disprove it. Sound ridiculous? Of cou...

Pineapple Surprise! Mixing trusting devices with sneaky Wi-Fi at #wdc13

I’m pushing the “Publish” button on this just before I go on stage at Web Directions Code [http://code13melb.webdirections.org/] because all things going well, what I’m going to talk about in this post will form part of my demo about securing web services. I’m making some (admittedly very simple) code available and providing some resources that will hopefully help everything I talk about with regards to unprotected wireless traffic make sense. I’d like to begin by introducing you to Pineapple...

Introducing the OWASP Top 10 Web Application Security Risks for ASP.NET on Pluralsight

I’ve been a little bit busy the last few months and here’s why – my first Pluralsight course, the OWASP Top 10 Web Application Security Risks for ASP.NET [http://www.pluralsight.com/training/Courses/TableOfContents/owasp-top10-aspdotnet-application-security-risks] . Actually, if I’m honest, it’s been a lot longer than that in the making as my writing about the OWASP Top 10 goes all the way back to right on three years ago now. It begin with the blog series [https://www.troyhunt.com/2010/05/owasp...

Your Mac, iPhone or iPad may have left the Apple store with a serious security risk

Just over a year ago to the day, my wife and I walked into the Apple store in Sydney’s CBD and bought her a shiny new MacBook Air. Macs weren’t familiar territory for us so we happily accepted the offer for a staff member to walk us through some of the nuts and bolts of OSX. That was a handy little starter and we left the store none the wiser that the machine now had a serious security risk that wouldn’t become apparent for another year. A couple of weeks ago I wrote about my new favourite devi...

The beginners guide to breaking website security with nothing more than a Pineapple

You know how security people get all uppity about SSL this and SSL that? Stuff like posting creds over HTTPS isn’t enough, you have to load login forms over HTTPS as well and then you can’t send auth cookies over HTTP because they’ll get sniffed and sessions hijacked and so on and so forth. This is all pretty much security people rhetoric designed to instil fear but without a whole lot of practical basis, right? That’s an easy assumption to make because it’s hard to observe the risk of insuffic...