How Acunetix addresses HTTP/2 vulnerabilities

How Acunetix addresses HTTP/2 vulnerabilities

| | Web Security Zone
In the latest release of Acunetix, we added support for the HTTP/2 protocol and introduced several checks specific to the vulnerabilities associated with this protocol. For example, we introduced checks for misrouting, server-side request forgery (SSRF), and web cache poisoning. In this article, we’d like... Read more The post How ... Read More
Remote Debuggers as an Attack Vector

Remote Debuggers as an Attack Vector

| | Web Security Zone
Over the course of the past year, our team added many new checks to the Acunetix scanner. Several of these checks were related to the debug modes of web applications as well as components/panels used for debugging. These debug modes and components/panels often have misconfigurations,... Read more The post Remote ... Read More
Cache Poisoning Denial-of-Service Attack Techniques

Cache Poisoning Denial-of-Service Attack Techniques

| | Web Security Zone
Attacks related to cache poisoning represent a clearly visible web security trend that has emerged in recent years. The security community continues to research this area, finding new ways to attack. As part of the recent release of Acunetix, we have added new checks related... Read more The post Cache ... Read More
Exploiting SSTI in Thymeleaf

Exploiting SSTI in Thymeleaf

One of the most comfortable ways to build web pages is by using server-side templates. Such templates let you create HTML pages that include special elements that you can fill and modify dynamically. They are easy to understand for designers and easy to maintain for... Read more The post Exploiting ... Read More
Bypassing SOP Using the Browser Cache

Bypassing SOP Using the Browser Cache

Misconfigured caching can lead to various vulnerabilities. For example, attackers may use badly-configured intermediate servers (reverse proxies, load balancers, or cache proxies) to gain access to sensitive data. Another way to exploit caching is through... Read More → The post Bypassing SOP Using the Browser Cache appeared first on Acunetix ... Read More
A Fresh Look On Reverse Proxy Related Attacks

A Fresh Look On Reverse Proxy Related Attacks

In recent years, several researches have been published about attacks deliberately or directly related to reverse proxies. While implementing various reverse-proxy checks on the scanner, I started analyzing implementations of reverse proxies. Initially, I wanted to analyze how both reverse proxies and web servers parse requests, find out inconsistencies in ... Read More
Better Web-Pentesting in Windows with AHK

Better Web-Pentesting in Windows with AHK

Recently, I have moved to Malta. It’s quite hot here, but as I’m from colder country, I like it very much. Actually, I’m obsessed with everything hot, including hotkeys! Every pentester / researcher / bugbounter / etc has their own approach to doing things in their own work environment. So ... Read More

Deserialization Vulnerabilities: Attacking Deserialization in JS

At ZeroNights 2017 conference, I spoke about “Deserialization vulnerabilities in various languages”. For my presentation, I used an interesting article about two serialization packages of Node.js. I showed them as examples of vulnerable implementations of deserialization processes. In this post, I’d like to show results of my own research and ... Read More