Blog

Exploitation: XML External Entity (XXE) Injection

Posted by Eric F. Tameesh on November 09, 2016Link 

Xxe Image

During the course of our assessments, we sometimes come across a vulnerability that allows us to carry out XML eXternal Entity (XXE) Injection attacks. XXE Injection is a type of attack against an application that parses XML input. Although this is a relatively esoteric vulnerability compared to other web application attack vectors, like Cross-Site Request Forgery (CSRF), we make the...Continue reading 

Polycom VVX-Series Business Media Phones Path Traversal Vulnerability

Posted by Jake Reynolds on December 11, 2015Link 

In June I spent a little time in the web administrative interface of a Polycom VVX600 IP phone running UC Software Version 5.1.3.1675. As I proxied the traffic through BurpSuite, I immediately noticed something interesting in the requests that the interface uses to display phone background images and ring tones to web users. The requests contained actual file names. Anyone involved...Continue reading 

Real-World Attack Scenario: From Blind, Timing-Based SQL Injection to Windows Domain Administrator

Posted by Jake Reynolds on November 06, 2014Link 

It's not uncommon for us to identify SQL injection (SQLi) vulnerabilities during network penetration tests or targeted web application security assessments although it sure seems to be getting less frequent. I hate using the term "SQLi Vulnerability" because SQLi is an attack, not a vulnerability. Whatevs though, the term is commonly used both ways in our industry. Modern development frameworks...Continue reading 

Security threats are all around us. Are you prepared?
Not sure? Lets Talk.