Events Related

Resources

  • OWASP Goatdroid – code.google.com/p/owasp-goatdroid/
    The OWASP GoatDroid Project pays homage to the OWASP WebGoat Project. It is a fully functional and self-contained environment for learning more about vulnerabilities and security issues for the Android platform.
  • Identifying And Detecting Security Breaches – usa.visa.com
    Visa has a slidedeck posted Identifying and Detecting Security Breaches. Sounds fun! If you’ve been around security for a while, nothing will be new in this deck, but it’s a nice and short to breeze through for ideas if something is missing in your enterprise security posture. Every bullet point also makes for a decent item to review or ask your team (if you have one) to describe how it is handled. (I do believe in role-playing!)
  • The Big Fat Metasploit Post – securityaegis.com
    A while ago we tried to identify a core toolset that every pentester should start with or couldn’t live without. The first article focused on Nmap, The second on our list is none other than the exploit framework Metasploit. Instead of reinventing the wheel with Metasploit guides we decided to take all the disparate info on using Metasploit and put it into one place, starting from the basics all the way to advanced testing.

Tools

  • The Zaproxy files – code.google.com/p/zaproxy/downloads/list
    An easy to use penetration testing tool.
  • WCE v1.2 64-bit version released – hexale.blogspot.com
  • The ERPScan WEBXML Checker! – erpscan.com/products
    As all of us know the importance of SAP (short for Systems, Applications and Products) systems. We also know that with increased exposure to new technologies, newer vulnerabilities are found. ERPScan WEBXML Checker, is a new tool from who we consider as a leading entity involved with discovering new SAP related vulnerabilities.

Techniques

  • A deeper look at ms11 – 058 – skullsecurity.org
    Two weeks ago today, Microsoft released a bunch of bulletins for Patch Tuesday. One of them – ms11-058 – was rated critical and potentially exploitable. However, according to Microsoft, this is a simple integer overflow, leading to a huge memcpy leading to a DoS and nothing more. I disagree.
  • Password Tracking In Malicious iOS Apps – software-security.sans.org
    In this article, John Bielich and Khash Kiani introduce OAuth, and demonstrate one type of approach in which a malicious native client application can compromise sensitive end-user data.
  • Apache HTTPD Killer Remote Denial of Service – eromang.zataz.com
    Kingcope has release, the 19 August, on Full disclosure mailing-list a perl script named “killapache.pl“ how can cause to Apache HTTPD Web server a remote denial of service (DoS). The DoS could be done by the attacker with a low requirement of ressources (CPU, memory and bandwidth) causing the targeted Web server to consume a big amount of ressources (CPU and memory). Apache HTTPD 2.0 and 2.2 series are affected by this vulnerability.
  • Setting up a persistent trusted CA in an Android emulator - intrepidusgroup.com
    Setting up a persistent trusted CA in the Android emulator is a common problem, encountered any time we assess an application within an emulator, that use SSL properly. The goal is to man-in-the-middle (MITM) traffic from an application running in the Android emulator.
  • IIS Search Verb Directory Listing – room362.com
  • My Flash 9 Workflow – www.l1pht.com/2011/08/my-flash-9-workflow/
    Just recently I’ve tested a number of web applications that made heavy use of Adobe Flash. Considering I didn’t find a whole lot when I was searching I thought I’d document my current workflow.
  • SSH Cheat Sheet – pentestmonkey.net
    SSH has several features that are useful during pentesting and auditing.  This page aims to remind us of the syntax for the most useful features.

Vendor/Software Patches

  • Microsoft Releases New Versions of Software Security Tools – threatpost.com
    Microsoft has released new versions of several of its software security tools, including itsThreat Modeling Tool and a pair of fuzzers. All of the tools are part of the company’s Security Development Lifecycle program, which it has been sharing with external organizations for a few years now.

Other News