Wherever you come from, you can meet BeEF
September 24, 2012
This year I've been very busy in terms of conferences, and ...
CVSS for Penetration Test Results (Part II: Attack Sequences)
September 24, 2012 | Tim Maletic
CVSS needs to be extended to accommodate combinations of vulnerabilities. The ...
The First Few Months of Penetration Testing: What they don't teach you in School
September 24, 2012 | Alex Fernandez-Gatti
I entered into school with the hope and dream of someday entering into the ...
Analysing X-Cart Compromises
September 24, 2012 | Marc Bown
Recently I've found myself performing a lot of forensic examinations of X-Cart ...
Oracle DBMS_Scheduler Fun on Windows!
September 20, 2012
So, last time I showed how to get a Unix reverse shell up and running just by ...
The New Zero-Day in Internet Exploder (Oops… Explorer)
September 20, 2012 | Rami Kogan
The ride on the rollercoaster called the web security world never stops and ...
Web Application Defense: Bayesian Attack Analysis
September 20, 2012
Regular Expressions for Input Validation If your web application defensive ...
Exploiting Users By Non-technical Means; or, “S Users Do”
September 18, 2012 | Barry O’Connell
Numerous technical articles emerge each day about the latest vulnerabilities, ...
Chat server fuzzing, Part 1. The Beginning
September 14, 2012 | Art Dahnert
This article (along with subsequent articles) will cover the journey I've taken ...
No, the Internet Does Not ‘Just Work’
September 12, 2012 | Space Rogue
The recent GoDaddy DNS outage illustrates that the Internet does not just work ...
Microsoft Patch Tuesday September 2012 – Update those Certs!
September 11, 2012
As we mentioned last week there are only two patches this month! Not to mention ...
Vulnerability Spidey Sense - Demystifying PenTesting Intuition
September 10, 2012 | Chris Vinecombe
In Louisville, Kentucky next month at Derbycon, Daniel Crowley and I will be ...
PenTesting: From Low Risk Issues to Sensitive Data Compromising
September 07, 2012 | Bruno Oliveira
Yes, I imagine you are probably tired to see blog posts about "real-world" ...
Getting a Start in the Security Industry
September 06, 2012 | Nate Sanders
This has been a fairly common topic over the last year and I've seen plenty of ...
Microsoft Advanced Notification for September 2012 - Bad News, Good News
September 06, 2012 | Space Rogue
Microsoft has released its Advanced Notification for September 2012. The bad ...
Hackers and Media Hype: Big Hacks that Never Really Happened
September 05, 2012 | Space Rogue
If you combine the dictionary definitions for 'media' and 'hype' you come up ...
CryptOMG Walkthrough - Challenge 1
September 05, 2012
It has been about 3 months since CryptOMG was released and I will start going ...
Phishing Evolves: Rogue IVRs
August 30, 2012
As someone who's worked in the financial industry for years, I'm fascinated by ...
The Patsy Proxy: Getting others to do your dirty work
August 30, 2012 | Dan Crowley
Patsy (slang) - A person easily taken advantage of, cheated, blamed, or ...
TWSL2012-019: Cross-Site Scripting Vulnerability in Support Incident Tracker
August 29, 2012 | Robert Foggia
Trustwave SpiderLabs has published a new advisory today for a Cross-Site ...
Client-side Payload - The Brazilian Way.
August 29, 2012 | Wendel Guglielmetti Henrique
My name is Wendel Guglielmetti Henrique, and I'm a senior security consultant ...
Backward Compatibility Plays to Malware’s Hands
August 29, 2012 | Moshe Basanchig
Maintaining backward compatibility in software products is hard. Technology ...
Stripe-CTF Walkthrough
August 29, 2012 | Ryan Linn
I had the opportunity to do the Stripe-CTF (Capture The Flag) contest this past ...
WAF Normalization and I18N
August 29, 2012 | Ryan Barnett
Submitted By Breno Silva Pinto and Ryan Barnett
How to Get the Most Out of a PenTest
August 29, 2012 | Nathan Drier
Being a PenTester for Trustwave Spiderlabs, I work with a huge amount of ...
How Antivirus Saved the Day…Sort of.
August 28, 2012 | Josh Grunzweig
Recently, I found myself in a common situation—helping a comrade in our ...
It's a sunny (zero) day for Java
August 27, 2012 | SpiderLabs Researcher
Java exploits have been used for distributing malware for a while. See for ...
PTJ Undermines Your Blinky Light Box
August 27, 2012
So, you just bought that fancy new box with the blinky lights that's supposed ...