Application Security This Week for November 25

by Bill Sempf 25. November 2018 17:27

A new open source project that generated an Android Studio project from an APK


Robert Graham has some thoughts on HTTP/3


NEWS FLASH!  There is a security hole in Adobe Flash.


Remember when I said there would never be a reliable exploit for the Rowhammer vulnerability?  I was wrong.


Mr. Krebs was alerted to a vulnerability at USPS that an exasperated researcher had been trying to get them to fix for a year.


Late addition: PortSwigger posted the Top 10 Web Application Security research for the last couple of years.


And that's the news!!



Application Security This Week for November 18

by Bill Sempf 18. November 2018 09:44

Here's a new set of training wheels for MetaSploit.  It's a little bumpy, but it is pretty decent as an intro to using scripting tools for exploitative pentesting.


A really good analysis of some PHP malware.  Beneficial reading for red and blue teams. As usual, please be careful playing with malware on your corporate network (or any other network).


A new XSS detection tool with some nice hand-written parsers.


And that's the news!



Application Security This Week for November 11

by Bill Sempf 11. November 2018 09:26

Happy Veterans Day. Please make sure that this isn't the only day of the year that you take the time to do something for a veteran in your life.


The OWASP Top 10 project has added the Serverless Application Top 10 to the collection.


Here's a good analysis of a live example of an Android banking trojan.


A malicious FaceTime caller can cause a kernal panic in some devices.


Squally is a purposefully vulnerable video game to teach hacking of games.  Neat idea.


Struts has yet another RCE bug.


There is a XSS bug in Evernote!


And that's the news.


Application Security This Week for November 4

by Bill Sempf 4. November 2018 10:04

A new-to-me file upload vulnerability scanner got an update recently - worth a look.


Not a very USEFUL vulnerability, but someone figured out how to bypass Chrome's security model for cookies.


Telerik (a developer tools company) has a good post on XSS and Content Security Policy.


And that's the news!


Husband. Father. Pentester. Secure software composer. Brewer. Lockpicker. Ninja. Insurrectionist. Lumberjack. All words that have been used to describe me recently. I help people write more secure software.

Find me on Mastodon

profile for Bill Sempf on Stack Exchange, a network of free, community-driven Q&A sites