Eureka! How Pulumi Brought Sanity to Our DevOps Team

I started out my professional career as a software developer then became a DevOps engineer. (Get it? It’s a joke.) The irony is that DevOps is not an engineering discipline at all, ...
Verifying NTP Reserved Mode Denial of Service Vulnerability

Verifying NTP Reserved Mode Denial of Service Vulnerability

| | CVE-2009-3563, DoS, NTP, Ruby
I recently needed to check a NTP Reserved Mode Denial of Service vulnerability CVE-2009-3563, but without causing the DoS condition on the production server.  Using Metasploit’s auxillary module auxiliary/dos/ntp/ntpd_reserved_dos was not an option ...
Sqlitespy for Sqlite Database analysis

Sqlitespy for Sqlite Database analysis

| | database, Ruby, SQLite, sqlitespy
Sqlite is the ubiquitous database for mobile applications on iPad, iPhone and Android. It is also used by certain internet browsers, web application frameworks and software products for their local storage needs ...
Decoding BigIP Cookie

Decoding BigIP Cookie

| | BigIP, cookie, decode, Ruby
BigIP cookie contains internal network IP and port information in encoded format. When decoded, these cookies can help create an internal network map with potential web server IPs and their ports. F5 ...
Breaking A Weak CAPTCHA implementation

Breaking A Weak CAPTCHA implementation

A while back I came across a web application that implemented captcha to prevent automated form entries. The captcha was weak and could be easily solved. Below I summarize the steps followed ...

Just the Facts Ma’am

Sometimes when you're testing it's good to be able to quickly get a feel for where to focus your attention or to get an overview of all the ports you've got open, ...
Ruby and OpenSSL Based SSL Cipher Enumeration

Ruby and OpenSSL Based SSL Cipher Enumeration

In this post, we will write our bare bones Ruby based SSL cipher enumerator to enumerate SSL cipher suites supported by a webserver. Without further delay, lets get started.Basics:The first step of ...