Here's a neat Android reverse engineering game.
https://0x00sec.org/t/reversing-hackex-an-android-game/16243
A tool to edit images to have payloads. Use it t o test and see if your imagine processing components have vulnerabilities!
https://github.com/chinarulezzz/pixload
I have been running into HTTP Request Smuggling a lot recently after the new research by PortSwigger. Here is an interesting writeup.
https://medium.com/@memn0ps/http-request-smuggling-cl-te-7c40e246021c
That's the news, folks.
Only Rails 6.x and 5.2.x are getting security updates. Plan your development accordingly.
https://rubyonrails.org/security/
Jason Karns was kind enough to pass along this awesome upgrade helper for Rails:
https://blog.testdouble.com/posts/2019-09-03-3-keys-to-upgrading-rails
I regularly write apps up for failure to disable autofill, and this article is a good explainer.
https://www.social-engineer.com/disable-autofill-browsers/
Bruce has a really good set of reasoning on why there is no difference between "commercial" encryption and "consumer" encryption.
https://www.schneier.com/blog/archives/2019/08/the_myth_of_con.html
iOS doesn't get a lot of malware love because it's only 12% of the phone market, but the bad guys realized that 12% has a lot of money, so here are a BOATload of exploits that Google found them.
https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html?m=1
I also write folks up for clickjacking a lot, and it is making a comeback. It's just a header people, add it.
https://nakedsecurity.sophos.com/2019/08/29/web-clickjacking-fraud-makes-a-comeback-thanks-to-javascript-tricks/
Some RCE flaws discovered in PHP. Update if you can, mitigate if you can't.
https://thehackernews.com/2019/09/php-programming-language.html?m=1
That's the news. Stay safe.
Apache called out for reporting incorrect versions in Struts vulnerabilities
https://www.infosecurity-magazine.com/news/apache-struts-incorrect-security/
A new breach at First American Financial, a mortgage company, might have exposed nearly a billion records
https://krebsonsecurity.com/2019/08/sec-investigating-data-leak-at-first-american-financial-corp/
Fireeye is using machine learning to grade the severity of vulnerabilities
https://www.fireeye.com/blog/threat-research/2019/08/automated-prioritization-of-software-vulnerabilities.html
Netflix and Google discovered a set of DDoS vulnerabilities in HTTP/2
https://www.theregister.co.uk/2019/08/14/http2_flaw_server/
Looks like Paige took a lot more than Capital One's stuff
https://www.theregister.co.uk/2019/08/14/capitalone_hacker_court/
That's the news!
A researcher found out that you can discover if a user is in incognito mode in Chrome using a timing attack.
https://blog.jse.li/posts/chrome-76-incognito-filesystem-timing/
That Microsoft RDP attack we talked about earlier? Yeah, it works in Azure.
https://thehackernews.com/2019/08/reverse-rdp-windows-hyper-v.html?m=1
In unrelated news, Microsoft has launched Azure Security Lab, a safe space to do appsec testing.
https://msrc-blog.microsoft.com/2019/08/05/azure-security-lab-a-new-space-for-azure-research-and-collaboration/
A cool bug was discovered in the Electron Framework.
https://www.contextis.com/en/blog/basic-electron-framework-exploitation
Frequent readers know that I am no fan of Apple's closed garden when it comes to app testing. Well, it might be opening a little. They have enhanced their bug bounty, and more importantly are going to offer quasi-jailbroken phones to researchers. I'll be in line for that.
https://www.theverge.com/2019/8/8/20756629/apple-iphone-security-research-device-program-vulnerabilities
That's the news!
Facebook is under heavy fire for privacy "violations", although they never did anything they didn't explicitly tell users they were going to do. Also, no privacy laws apply to what they did wrong. Also, if the product is free, you are the product. Blah blah. Fact is, in a capitalist society, companies are going to do whatever they can within the constraints of the law to make a buck. If they make enough customers angry, they will eventually lose money, and that is the incentive to stay on the straight and narrow.
Anyway, in case you hadn't heard, there are a lot of things going on here that has raised the ire of Facebook's customer base. For years, I have demoed using the Open Graph API to download either all of the public users on Facebook, or friends of friends private information. Of course, as we all know, Cambridge Analytica used that same API to write a slick little plugin to gather a boatload of information and sell it to political candidates, which influenced elections, and they are kinda important around here, so people got mad. Technically, they did nothing that hasn't been done a hundred times (hell, I have written software that does it) but this time people got mad. So be it.
Then there is the fake news, and the tracking, and watching where you go on the web even if you don't have a Facebook account, and and and you get the idea. Folks got mad. Facebook did the whole mea culpa thing, as one does, and their customer count still goes up. As the time of this writing, they are still the most used application on the planet. Roger that.
Once upon a time
Let's get in the wayback machine. No, not Brewster Kahle's WayBack Machine, just an imaginary one. In 2002, I was at TechEd signing the newly minted Professional Visual Basic.NET book, and trying to keep up with the Wrox contingent (news flash: Brits can drink.) In the evenings, I was working on an article about the second incarnation of Microsoft Passport. The original version was a try at what is now Active Directory Federated Services, but this version was a wholistic internet identity. It would track your calendar, your credit cards, your contact list, your email, everything, and help you out. If you bought plane tickets, it would have your Visa at the ready, and automatically add flight to your calendar. If your kids emailed to tell you they needed cupcakes for the bake sale, BANG, on the shopping list.
But … there was a problem. The user base went shitfuck. Some of the comments I remember were "I'll sooner throw my computer in the river than give Microsoft access to my calendar and credit cards" and "Are you saying they will look at our email and change our data without asking first" and "The day will never come that I will let Microsoft log me into my bank".
Yeah.
Anyway, if you of a certain age, and I told you the names of the people what wrote those things, you would instantly recognize them, I promise you. Me, I thought Passport was pretty neat. Not many other people thought it was neat. Court cases were filed. People quit Microsoft jobs (really!) over this. It was a disaster.
Fast forward
So here we are today. Facebook is under fire for using the data that people gave them freely to buy Mark more fast cars and hot women and blow, and people are mad. Meanwhile, they are logging into American Airlines, using their stored credentials, and their saved credit card info, and the email from American automatically adds the flight to their Google calendar.
Suffice it to say, in 15 years we'll be having this same, exact conversation about some other technology, maybe facial recognition and brain scanning or something. I dunno. William Gibson probably does. Either way, Facebook has breached the front. In not too long, the user base will have gotten used to it, and whatever is after Facebook will sell our data with impunity.
It's 1994 again! Encryption is on the table for law enforcement. Be ready for entry in the back door soon.
https://www.theregister.co.uk/2019/07/23/us_encryption_backdoor/
If you want to read about the LAST time we tried this, I recommend Matt Curtin's book Brute Force.
https://www.amazon.com/Brute-Force-Cracking-Encryption-Standard/dp/1441918957
Very good analysis of the XML eXternal Entity (XXE) attack.
https://www.synack.com/blog/a-deep-dive-into-xxe-injection/
Gitlab's Global Developer Report has some interesting security insights.
https://learn.gitlab.com/c/2019-global-develope
If you write mobile apps, and your vulnerability assessment mentions "a third party malicious app could exploit this" pay attention to it. It's really happening in the wild.
https://www.infosecurity-magazine.com/news/uptick-in-ransomware-mobile/
That's the news!
Awesome paper presented in France covering XXE - really good research. Worth a read.
https://www.gosecure.net/blog/2019/07/16/automating-local-dtd-discovery-for-xxe-exploitation
Those who have taken my training know how I talk about protecting the soft meaty middle - well, Slack is proving that user accounts are the gift that keeps on giving. They reset passwords - from a breach 4 years ago.
https://thehackernews.com/2019/07/slack-password-data-breach.html
https://www.theregister.co.uk/2019/07/19/2015_database_hack_slack/
Really neat tool for hooking executables in Windows. I tried it, it's super neat.
https://github.com/everdox/InfinityHook
Here's an I-wish-it-was-an-OWASP-project example. Tons of research on Command injection.
https://hackersonlineclub.com/command-injection-cheatsheet/
That's the news folks. Stay safe out there.
A wonderful human being put together a list of resources about hacking mainframe systems, worth a look if your organization is run on the big metal.
https://github.com/samanL33T/Awesome-Mainframe-Hacking/
Apple had a not-good-very-bad week. First, the OpenIF Foundation dinged the Mac implementation of "Sign in with Apple"
https://nakedsecurity.sophos.com/2019/07/08/privacy-and-security-risks-as-sign-in-with-apple-tweaks-open-id-protocol/
Then it was discovered that all of the magic of Zoom's conference software is due to a web server installed on MacOS, which you can't remove! (Heeeey!)
https://www.engadget.com/2019/07/09/zoom-will-remove-server-behind-mac-security-hole/?ncid=txtlnkusaolp00000618
Rhino Security released a new version of CloudGoat, an insecure-by-design cloud deployment tool.
https://rhinosecuritylabs.com/aws/cloudgoat-walkthrough-rce_web_app/
One of my favorite attacks against file uploads that take zip files is the zipbomb. Well, someone made a really nice one.
https://www.vice.com/en_us/article/597vzx/the-most-clever-zip-bomb-ever-made-explodes-a-46mb-file-to-45-petabytes
There is a flaw in the Android update system that allows attackers to modify updates on the fly. Oh, and it is being exploited in the wild.
https://thehackernews.com/2017/12/android-malware-signature.html?m=1
That's the news, folks. Have a safe week!