Blog | Media

Real-World Attack Scenario: From Blind, Timing-Based SQL Injection to Windows Domain Administrator

Posted on November 06, 2014Link 

It's not uncommon for us to identify SQL injection (SQLi) vulnerabilities during network penetration tests or targeted web application security assessments although it sure seems to be getting less frequent. I hate using the term "SQLi Vulnerability" because SQLi is an attack, not a vulnerability. Whatevs though, the term is commonly used both ways in our industry. Modern development frameworks...Continue reading 

New Details on CitiGroup Compromise

Posted on June 14, 2011Link 

The Daily Mail has a short article about how the recent compromise of 200,000+ Citigroup accounts occurred. Of course there is not much technical detail but the vulnerability and exploit are pretty obvious if what the article says is correct: "They simply logged on to the part of the group's site reserved for credit card customers - and substituted their account...Continue reading 

How to Get Properly Owned

Posted on May 20, 2011Link 

Expose unnecessary ports via NAT and firewall rules to your DMZ. I'm talking SSH, telnet, HTTP/S, SNMP, MS-SQL, MySQL, YourSQL, NetBIOS.... everything. If you're really serious about getting compromised, NAT public addresses to your internal Active Directory servers and database.If you don't have a firewall or a DMZ, all the better.Make sure no effective firewall policies exist...Continue reading 

Security threats are all around us. Are you prepared?
Not sure? Lets Talk.