Yahoo accounts for at least 500 million users was stolen apparently from back in 2014. The information may have included usernames, email addresses, phone numbers, birthdates, security questions and answers, Yahoo said.
When creating web applications these days security must come first. Building the application without security and then attempting to retrofit it with security after the fact is a fruitless exercise. There will always be an excuse from upper management that it isn’t a high enough priority to secure it properly, “just fix the worst vulnerabilities and quickly Read more about My Application Security Notes[…]
Palo Alto Networks released an update to PAN-OS yesterday, which patches five vulnerabilities: Critical – Unauthenticated Buffer Overflow in GlobalProtect/SSL VPN Web Interface (PAN-SA-2016-0005). High – Unauthenticated Command Injection in Management Web Interface (PAN-SA-2016-0003). Medium – Unauthenticated Stack Exhaustion in GlobalProtect/SSL VPN Web Interface (PAN-SA-2016-0004). Medium – ESM Console XSS vulnerability (PAN-SA-2016-0001). Low – Command Injection in Command Line Interface Read more about 5 New Palo Alto Networks PAN-OS Vulnerabilities[…]
Buffer Overflow in glibc (CVE-2015-7547) Are you affected? Existing Gingsoft Online Vulnerability Scanner customers will get a free scan for this once the scanner plugin is updated. We will then provide you via email if we see that you are vulnerable as well as sending the scan report. You can check your version of glibc Read more about Buffer Overflow in glibc DNS Client Side Resolver[…]
This vulnerability, CVE 2016-1287, should get your attention if you are using any of the Cisco ASA firewalls listed below, you should patch immediately: Cisco ASA 5500 Series Adaptive Security Appliances Cisco ASA 5500-X Series Next-Generation Firewalls Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers Cisco ASA 1000V Cloud Read more about Critical Remote Code Execution Vulnerability on Cisco ASA Firewalls[…]
While conducting an Air Assault on a wireless network, my weapon of choice is the Aircrack-ng suite. The suite contains around 18 tools depending on the version, but I will only mention a few here (Airmon-ng, Airodump-ng, Aireplay-ng, and most famously Aircrack-ng). I used a separate application named Crunch to create a brute-force dictionary. Airmon-ng (Enable Read more about How to Crack WPA2 PSK with Aircrack-ng[…]
The Metasploit Framework is not something that runs out and exploits all available targets automatically. This is not a script kiddie tool for aiming and pulling a trigger. This a serious toolbox full of modules, exploits, and payload templates. You need to know how to put it all together to get anything meaningful out of Read more about My Metasploit Framework Notes[…]
I’ve been noticing this for weeks now. A massive NTP amplification attack from Guangzhou China on Roseville California.
China was attacking TCP ports 50856, 50864, and the known backdoor port TCP 53413 found in Chinese made routers.
Burp Suite is a handy tool that’s freely available for web application testing. I uncovered a GET request to a Russian domain while troubleshooting something else. Needless to say my first thought was a compromise. This is an eye opener when it comes to the shear amount of requests that get made while using a Content Read more about Analyze Your Web Applications[…]