Blog | Techniques

Hashing Horror

Posted on April 06, 2017Link 

Recently, I was working on a web application assessment that acted like a feature filled version of the Damn Vulnerable Web App. That meant there was a lot of XSS of course and a heavy handful of SQL injection vectors. This isn’t a post on how terrible the application was but the interesting way they chose to store their...Continue reading 

Exploitation: XML External Entity (XXE) Injection

Posted on November 09, 2016Link 

Xxe Image

During the course of our assessments, we sometimes come across a vulnerability that allows us to carry out XML eXternal Entity (XXE) Injection attacks. XXE Injection is a type of attack against an application that parses XML input. Although this is a relatively esoteric vulnerability compared to other web application attack vectors, like Cross-Site Request Forgery (CSRF), we make the...Continue reading 

Real-World Attack Scenario: From Blind, Timing-Based SQL Injection to Windows Domain Administrator

Posted on November 06, 2014Link 

It's not uncommon for us to identify SQL injection (SQLi) vulnerabilities during network penetration tests or targeted web application security assessments although it sure seems to be getting less frequent. I hate using the term "SQLi Vulnerability" because SQLi is an attack, not a vulnerability. Whatevs though, the term is commonly used both ways in our industry. Modern development frameworks...Continue reading 

Have Questions?
Get Answers