I Click Therefore I Am - PixelCAPTCHA Demo App

I Click Therefore I Am – PixelCAPTCHA Demo App

TL; DR - Everyones hates CAPTCHAs! So do I. But I wrote a new one anyway :p. It's a visual CAPTCHA scheme that can be solved with 2-4 mouse clicks and is named pixelcaptcha.Here are the links to a borderline ugly demo web application (I like to think its borderline), a detailed white ... Read More
Understanding ysoserial's CommonsCollections1 exploit

Understanding ysoserial’s CommonsCollections1 exploit

Last year, ysoserial was released by frohoff and gebl. It is a fantastic piece of work. The tool provides options to generate several different types of serialized objects, which when deserialized, can result in arbitrary code execution if the right classes are present in the classpath. In this blog post, I ... Read More
Patching an Android Application to Bypass Custom Certificate Validation

Patching an Android Application to Bypass Custom Certificate Validation

One of the important tasks while performing mobile application security assessments is to be able to intercept the traffic (Man in The Middle, MiTM) between the mobile application and the server by a web proxy like Fiddler, Burp etc… This allows penetration tester to observe application behavior, modify the traffic ... Read More
Debugging Out a Client Certificate from an Android Process

Debugging Out a Client Certificate from an Android Process

I had setup my web proxy to intercept the Android application’s traffic, tested the proxy configuration with HTTPS based Android applications and the traffic interception worked like a charm. However, for the application under test, things were different. Connections to the applications’ server returned HTTP 403 error code because SSL ... Read More
Extracting RSAPrivateCrtKey and Certificates from an Android Process

Extracting RSAPrivateCrtKey and Certificates from an Android Process

An Android application that I assessed recently had extensive cryptographic controls to protect client-server communication and to secure its local storage. To top that, its source code was completely obfuscated. Combined, these two factors made the application a great candidate for reversing. In this blog I will detail the portion ... Read More
Validating Custom Sanitization in Web Applications with Saner

Validating Custom Sanitization in Web Applications with Saner

IntroductionI recently read a paper in which the authors combined static and dynamic source code review techniques to evaluate the effectiveness of custom built data sanitization routines in PHP based web applications. The paper was very interesting and I thought to summarize it for quick consumption.The authors suggest that static ... Read More
Exploiting Insecure crossdomain.xml to Bypass Same Origin Policy (ActionScript PoC)

Exploiting Insecure crossdomain.xml to Bypass Same Origin Policy (ActionScript PoC)

Adobe Flash is among the most popular browser plugins and also ships by default with a couple of popular web browsers. Its widespread prevalence has made it a frequent target of attacks and also been as a vector to launch attacks. One such attack vector is to use Flash for ... Read More
Security Considerations for ActiveMQ's Simple Authentication Plugin

Security Considerations for ActiveMQ’s Simple Authentication Plugin

Apache ActiveMQ is a popular message broker that has several security features to help secure its deployment. User or client authentication typically a very important security requirement for enterprise applications and ActiveMQ offers two plugin based authentication mechanisms that need to be explicitly enabled and sometimes even coded based on ... Read More
Attacking OData with OyeData!

Evaluating OData Applications

I was recently evaluating a SaaS provider's OData application, evaluating how its endpoint client application communicated via OData to its backed servers. The client application allowed SaaS consumers to schedule critical computation functions, download the results, and perform additional actions using OData’s RESTful operations.This blog post aims provide an overview ... Read More
Verifying NTP Reserved Mode Denial of Service Vulnerability

Verifying NTP Reserved Mode Denial of Service Vulnerability

| | CVE-2009-3563, DoS, NTP, Ruby
I recently needed to check a NTP Reserved Mode Denial of Service vulnerability CVE-2009-3563, but without causing the DoS condition on the production server.  Using Metasploit’s auxillary module auxiliary/dos/ntp/ntpd_reserved_dos was not an option so I wrote my own Ruby script to assess the remote server. This script verifies the returned UDP ... Read More
Loading...