shampoo: websec

Sort by: Date / Title / URL

  1. Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.
  2. 24-06-2010 to , , and -1 others
  3. Online security check for outdated browser plug-ins
    01-06-2010 to , , , and -1 others
  4. Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. The resulting map is then annotated with the output from a number of active (but hopefully non-disruptive) security checks. The final report generated by the tool is meant to serve as a foundation for professional web application security assessments.
  5. Yesterday, I received a post in the Pen-Test mailing list requesting for tips/resources on penetration testing of flash applications.  While there are some tools and white papers available, I could not find many authoritative resources which wraps the entire spectrum of flash security testing of RIA applications.  So here is an endeavor to detail out the steps of testing.  I will keep this post only to outline the essential steps or points.  Please feel free to recommend additional inclusion of tools and techniques.  The idea is to come up with a comprehensive paper which can be used by pen-testers to test flash based Rich Internet Applications (RIA).
  6. When a website (E.g. example.com) makes requests to another site (E.g. myonlinebank.com), it can potentially cause harmful effects (This is called Cross-Site Request Forgery). The problem with this kind of attack is that it often goes undetected, but leaves the user with the aftermath. CsFire protects you against this kind of attacks, by rendering these requests harmless. This is done by removing authentication information (cookies and authentication headers).
    04-02-2010 to , , , and -1 others
  7. Chris Evans on using HTML forms to create cross-domain XML payloads. Some restrictions apply.
  8. 10-06-2009 to , , , and -1 others
  9. Intranets are intended to be secured from the outside by way of firewalls and other networking devices. Unfortunately, there has been a move towards non-routable address space as a method of protection, rather than other methods of protecting private IP space. This paper will outline a number of flaws that can be exploited by an adversary because of the use of well known non-routable IP address spaces.
  10. Proposals for modifications to OAuth so that I will work better outside of the web browser.

First / Previous / Next / Last / Page 1 of 5