Ravikanth's Blog

Happenings around Me


India MVP Blogs

Mugh blogs


My Favorites

My Network Places

Honeywell and Miss America 2007 Educate Families about Internet Safety

To convey the importance of Internet Safety, Honeywell produced this video with Internet safety advocate Lauren Nelson, Miss America 2007. This will help customers and prospects learn about the dangers in cyberspace. Click here for video.

Posted: Apr 27 2009, 11:33 PM by dvravikanth | with 1 comment(s)
Filed under:
Firefox Plugins for Security Professionals by Schmidt, Chris

Access Me
Although it doesn’t find 90% of what it says it will, this plugin can be somewhat useful for determining whether a server configuration is vulnerable to certain attacks that can me made with different request methods such as DELETE.

SQL Inject Me
I have seen this plugin succesfully detect several *easy-to-find* SQL Injection vulnerable form fields. But it doesn’t really do a whole lot of checking beyond the simple obvious ones.

Of all of the Security Compass plug-in’s this one is by far the most useful and does most of what it says it will. However, just because the plug-in says a site is not vulnerable to XSS doesn’t mean it truly isn’t. This plugin, like SQL Inject Me, simply checks for the simplest XSS vectors.

Web Developer
Of every plugin I use, I probably use the functionality of this one more than any other. This is an entire suite of tools aimed at assisting web developers with things like local validation, src highlighting, form modifications, etc. That being said, the same functionality is invaluable to web application hackers to break your forms, discover XSS vectors, and analyze your code for other problems.

Like Web Developer, this plugin was designed and built with the developer in mind. However, with enhanced JS debugging capabilities, and arguably the best DOM browser there is, this plugin has singlehandedly been responsible for more XSS powered CSRF exploits in my audits than every tool in my toolkit combined. This is a must-have.

Passive Recon
This is an entire suite of tools that allow you to pseudo anonymously get a pretty detailed domain recon report from a single click, or parts of that report individually. This can come in very handy when performing an audit on a site or app that you know very little about to begin with and often gives insight into the system and server architecture of the target that can prove invaluable to finding holes.

If you haven’t heard of TOR you probably have no idea what I am talking about in most of the above plugins. While it is by no means perfect, and can never replace a good proxy chain, TOR provides basic anonymization of your internet traffic. This button allows you to switch in and out of TOR mode in firefox with a single click.

Firecookie is actually an extension to the FireBug plugin, and thus requires that FireBug be running and installed. However, it provides a means to view and edit cookies in real-time.

Modify Headers
This plugin can prove invaluable when used correctly, for everything from spoofing user-agent to spoofing client ip, this is a must have for any hackers toolbox.

Tamper Data
Like Modify Headers, the Tamper Data plugin allows you to modify headers and cookies. The difference is, it does so on a Per-Request policy, meaning that if you are enumerating manually to isolate a bug, this plug-in will prove to be your best friend. I have broken many a webservice with this tool.

Security logic flaws - Real world examples by Bill cory

* Yahoo had a promotional offer where if you deposited USD $30 into an advertising account, Yahoo would then add an additional USD $50 to that account.  The sign-up process was able to be circumvented in such a way that failing to deposit the requisite USD $30 still allowed the additional USD $50 to be credited to the account.

 Yahoo SEM Logic Flaw

* Tower Records' form validation assumed that the user would fill out a form in the order presented, but in reality, some users filled out the bottom portion first, causing a bug that wasn't caught during development and resulted in the loss of sales.

 Tower Records Tunes Its Site

* YouTube restricts some videos to users that are 18-years-old and older on their site. However, if the same video is embedded in another site, then the process that filters the videos is bypassed, allowing anyone of any age to view the video.

 Youtube’s 18+ Filters Don’t Work

* Facebook restricts access to private user pages, but there have been incidences where an attacker can replace the user ID in the URL with a victim ID, thereby circumventing the security measures.  Two examples include accessing private photos and accessing private fan pages.

 Peekaboo! Facebook fills photo security hole

 Hole unveils Facebook fan pages

* E-trade and Schwab failed to limit one bank account to any given user, allowing an attacker to assign the same bank account to tens of thousands of users, resulting in a loss of USD $50,000.00.

 Man Allegedly Bilks E-trade, Schwab of $50,000 by Collecting Lots of Free 'Micro-Deposits'

* AT&T offered free wi-fi service to iPhone users, but to distinguish the iPhone users from the rest, AT&T used the user-agent and an iPhone phone number to determine who received the free service.  By changing the user-agent and providing a phone number to any iPhone account, users of other devices were able to obtain free wi-fi service.

 Apple and AT&T providing free Wi-Fi access to iPhone users and oops… to everyone else as well!

* MySpace restricts access to private user photos, but when they launched a new service that allowed sharing of data with Yahoo, the process contained a flaw that allowed access to private user photos via Yahoo.

 Paris and Lindsay Hacked Again (There’s a Lesson Here, Really)


TA-Mapper: Application Penetration Testing Effort Estimator
My colleague Debasis has released TA-Mapper tool @ http://coffeeandsecurity.com/resources/tools/tamapper.aspx

TA-Mapper (Time and Attack Mapper) is an effort estimator tool for blackbox security assessment (or Penetration Testing) of applications.

This tool is very useful, when you need to explain\justify efforts at micro level.

Secure Coding Standard for Java

CERT and Sun Microsystems have released The CERT Sun Microsystems Secure Coding Standard for Java.

The rules and recommendations are not globally editable, but anyone is able to add comments, and qualified individuals can be added as editors.


Determine the security risk of using Open source projects

Visit the Java Open Review, an open source project sponsored by Fortify Software which uses Fortify SCA tools and Findbugs to look for defects in software – as a service. It publishes aggregated statistics but has a "responsible disclosure policy", which means details of bugs found are fed back only to the authors.

The project on going basis analyses some common open source projects and other applications, including Hibernate, Struts, Spring, Apache frameworks and Tomcat then publishes list of defect free projects from quality & security perspective.

Using Defect free project list, consumers can gauge the level of risk involved in different open source components.

Acrobat Reader (CVE-2007-5659) Download/Exec Exploit Demo video

My colleague Debasis has released Acrobat Reader Download/Exec Exploit Demo Video @ http://coffeeandsecurity.com/resources.aspx.

Due to hosting space/bandwidth constraint, He will not keep the original version for long....so grab it before it is gone.

Microsoft Threat Modeling 3.0 & Optimization Model tools slated to release in November 2008
Microsoft is planning to roll out new version of Threat Modeling Tool 3.0 in November, 2008, which focuses on the software design process, with built in guidance and advice into the tool. Also shows what is the [security] implication of a design, and gives a chance to learn about security in a way that's broader than just vulnerabilities. Microsoft will also roll out the Optimization Model in November, 2008. Another free download, it is designed to show an organization where it currently stands on the secure development front and then helps it move toward a broader use of the SDL techniques. Both the tools are free & helps in writing more secure code.
Step by Step - By passing .NET Validate Request
The Microsoft .NET framework comes with a request validation feature, configurable by the ValidateRequest setting. ValidateRequest has been a feature of ASP.NET since version 1.1. This feature consists of a series of filters, designed to prevent classic web input validation attacks such as HTML injection and XSS (Cross-site Scripting). The following paper introduces script injection payloads that bypass ASP .NET web validation filters and also details the trial-and-error procedure that was followed to reverse-engineer such filters by analyzing .NET debug errors.






The original version of this paper was released in January 2006 for private CPNI distribution. This paper has now been updated in August 2008 to include additional materials such as input payloads that bypass the latest anti-XSS .NET patches (MS07-40) released in July 2007. 


Implementing an Anti-Virus File Scan in JEE Applications

The following article will discuss, step by step how to implement anti virus solution (file scanning for virus) in Java, particular in the JEE applications.




More Posts Next page »