Cross Environment Hopping

Tuesday, July 1st, 2008

Our research team has identified a web-based attack technique that exploits the growing number of applications that require a web server being run on a local machine. Cross-Environment Hopping (CEH) is a result of this trend combined with the current limitations in browsers’ same-origin policy access restrictions. The CEH technique enables ...

New tools to block and eradicate SQL injection

Tuesday, June 24th, 2008

The MSRC released an advisory today that discusses the recent SQL injection attacks and announces three new tools to help identify and block these types of vulnerabilities. The advisory discusses the new tools, the purpose of each, and the way each complements the others. The goal of this blog post is ...

New Security Tools

Monday, June 9th, 2008

Here is a list of new security tools that were released in the past week. SQL Ninja 0.2.3 - SQL server injection and takeover tool fgdump 2.1.0 - Tool for mass password auditing of windows systems AxBan 1.0.0.4 - ActiveX killbit program Nmap 4.65 - Network port scanner Nessus 3.2.1 - Vulnerability assessment tool Immunity Debugger ...

What you need to know about HTTP Verb Tampering

Wednesday, June 4th, 2008

Recently Arshan Dabirsiaghi, Director of Research of Aspect Security, published a white paper entitled “Bypassing URL Authentication and Authorization with HTTP Verb Tampering”. Initially there was a lot of confusion about what exactly was being explained or claimed. Including, is it real? Is it novel? Is it dangerous? What is ...

Malware & MySQL – Believe it!

Tuesday, June 3rd, 2008

Most malware tends to store stolen credentials and information in make-shift text files, which are then forwarded to the author via email or another protocol. However, the use of scalable and robust solutions is becoming more popular in the malware community. In fact, it is becoming increasingly popular for malware ...