Application Security Weekly for March 25

by Bill Sempf 25. March 2018 11:31

HSTS tracking beats even incognito mode in browsers, and it more and more often used by advertisers.  In the most recent edition of OSX, Safari has two mitigations in place for this issue.  Let's hope other browsers follow suit shortly.


Here's a really good writeup by as researcher that discovered an XML External Entity vulnerability in Windows Remote Assistance.


Dropbox and Netflix join the growing group of large technology organizations promising not to sue white hat security researchers.


Here's another application vulnerability analysis procedure, well written and organized.


A new blog series: Application Security Weekly

by Bill Sempf 18. March 2018 18:10

No, I haven't given up on my OTHER blog series about application vulnerability assessment but an opportunity opened up to start publishing my client newsletter on my blog.  It's just usually four stories about appsec that I think are particularly important this week.  Not even a lot of commentary, but if you only have so much time to absorb appsec news, then this could be a great way to fit some news in.

Enough chatting, this weeks stories:


Any authenticated user on a Samba 4 Active Directory can change any other users' password via LDAP.  A patch is available.


Ass we all surmised, there was an app that leveraged Open Graph to download profiles from Facebook for the purposes of crafting the election advertising.

I spend a lot of time talking about the Facebook Open Graph, here I am three years ago at Cleveland BSides:


Abusing Certificate Transparency logs to get subdomains from an HTTPS website:


A nice primer on breaking encryption from MalwareBytes:


Happy hunting!



Husband. Father. Pentester. Secure software composer. Brewer. Lockpicker. Ninja. Insurrectionist. Lumberjack. All words that have been used to describe me recently. I help people write more secure software.

Find me on Mastodon

profile for Bill Sempf on Stack Exchange, a network of free, community-driven Q&A sites