WordPress XSS Vulnerability Can Result in Remote Code Execution (RCE)

Category: Web Security Readings - Last Updated: Tue, 09 Apr 2019 - by Ziyahan Albeniz
WordPress XSS Vulnerability Can Result in Remote Code Execution (RCE)

This article discusses vulnerabilities in older versions of WordPress due to its pingback and trackback features, and flawed sanitizing mechanism. It describes how attackers can use HTML tags to bypass sanitizing and insert an XSS payload using the WordPress flaw. Finally, it concludes with advice on how to fix the vulnerability in WordPress. Read More

Application Security is Vital Throughout SDLC

Category: Web Security Readings - Last Updated: Tue, 02 Apr 2019 - by Ziyahan Albeniz
Application Security is Vital Throughout SDLC

Research shows that developers must be directed to write secure code and don’t have enough information about security, often copying and pasting code from the internet. This blogpost examines weak ways to store user passwords, warning that strong algorithms may not be enough for security, and provides advice on how to store passwords securely. Read More

Behind the Scenes of Onion Services

Category: Web Security Readings - Last Updated: Fri, 22 Mar 2019 - by Ziyahan Albeniz
Behind the Scenes of Onion Services

Tor is an anonymity network that provides so-called onion services so that users can hide their locations. This article explains how to start a Tor service and change your domain name. It examines research on the security risks of regular onion domains, the user habits on Tor services, and possible fixes and updates for security concerns. Read More

Transforming Self-XSS Into Exploitable XSS

Category: Web Security Readings - Last Updated: Thu, 14 Mar 2019 - by Ziyahan Albeniz
Transforming Self-XSS Into Exploitable XSS

This blog is describes an attempt by a security researcher to exploit a Cross-site Scripting (XSS) vulnerability. It explains the importance of template strings – including multi-line strings and tagged templates – in XSS filtering, how to overcome the document.domain issue, and the discovery and exploitation of Self-XSS, with reading suggestions. Read More

The End of CoinHive and the Rise of Cryptojacking

Category: Web Security Readings - Last Updated: Thu, 07 Mar 2019 - by Ziyahan Albeniz
The End of CoinHive and the Rise of Cryptojacking

Cryptojacking is the unauthorized use of a computer to mine cryptocurrency. This article traces the development of Cryptojacking from ByteCoin and Monero, used by the CoinHive service. It examines how Cryptojacking works, the latest research, and content security policy solutions that limit source loading and report Cryptojacking scripts. Read More

Sound Hijacking – Abusing Missing XFO

Category: Web Security Readings - Last Updated: Thu, 28 Feb 2019 - by Ziyahan Albeniz
Sound Hijacking – Abusing Missing XFO

This article examines a new attack on Google Docs called Sound Hijacking, which leads to the takeover of users’ audio input devices. We investigate how the attack works and conclude with an evaluation of the importance of the X-Frame-Options Header for the attack and information on which browsers support it. Read More

Brave Browser Sacrifices Security

Category: Web Security Readings - Last Updated: Thu, 21 Feb 2019 - by Ziyahan Albeniz
Brave Browser Sacrifices Security

Brave is a browser that blocks ads and website tracking to improve user privacy and security. This blog post describes a controversial update to Brave that contained a whitelist of tracking URLs, causing online discussions, and a temporary but active solution. This blog examines some key terms and suggests how Brave could learn from Firefox. Read More

Phishing by Open Graph Protocol

Category: Web Security Readings - Last Updated: Thu, 07 Feb 2019 - by Ziyahan Albeniz
Phishing by Open Graph Protocol

Open Graph Protocol (OGP) was introduced by Facebook to highlight shared links in social media platforms. Phishing attacks use OGP to deceive users into clicking links that redirect them to other websites. This blog post explains what the OGP looks like, discusses phishing attack research and finally lists some precautions to take against them. Read More

Remote Hardware Takeover via Vulnerable Admin Software

Category: Web Security Readings - Last Updated: Tue, 29 Jan 2019 - by Ziyahan Albeniz
Remote Hardware Takeover via Vulnerable Admin Software

This article focuses on new research into potential remote hardware takeover vulnerabilities in admin software. These vulnerabilities occur due to a lack of control mechanisms, which enables potential WebSocket Hijacking attacks. The article explains how these attacks work, how to prevent them, and the importance of a content security policy header. Read More

Cross Site Cookie Manipulation

Category: Web Security Readings - Last Updated: Thu, 24 Jan 2019 - by Ziyahan Albeniz
Cross Site Cookie Manipulation

This article examines the security of PHP's session cookies in a shared hosting environment, and explains why a cryptographically secure, random session ID is not enough to prevent attacks. It explains how PHP handles cookies and how the session management feature initializes in PHP. Finally, it provides an attack demo and advice for prevention. Read More

Clickjacking Attack on Facebook: How a Tiny Attribute Can Save the Corporation

Category: Web Security Readings - Last Updated: Fri, 04 Jan 2019 - by Ziyahan Albeniz
Clickjacking Attack on Facebook: How a Tiny Attribute Can Save the Corporation

This article explains the origins of the Clickjacking Attack and how it works. It then examines how a researcher discovered a Clickjacking bug on Facebook and how Facebook responded to the Clickjacking attack. Finally, the article provides advice on how to prevent Clickjacking Attacks by using the X-Frame-Options HTTP security header. Read More

Tabnabbing Protection Bypass

Category: Web Security Readings - Last Updated: Thu, 06 Dec 2018 - by Ziyahan Albeniz
Tabnabbing Protection Bypass

This blog post includes a discussion of URLs, their structure, how they can contain sensitive information and why it's so difficult to parse them without introducing vulnerabilities. We include an example of how a parsing error led to a Window Opener Protection Bypass. Read More

Fragmented SQL Injection Attacks – The Solution

Category: Web Security Readings - Last Updated: Thu, 29 Nov 2018 - by Ziyahan Albeniz
Fragmented SQL Injection Attacks – The Solution

In this blog post, we discuss the research on Fragmented SQL Injection where the hackers control two entry points in the same context in order to bypass the authentication form. Our security researcher looks at the importance of single quotes in the SQL injection attacks and the solution, Prepared Statements, also known as Parameterized Queries. Read More

Web Browser Address Bar Spoofing

Category: Web Security Readings - Last Updated: Thu, 15 Nov 2018 - by Ziyahan Albeniz
Web Browser Address Bar Spoofing

This blog post looks at two address bar spoofing incidents. The first involved the Homograph vulnerability, where attackers used the IDN feature to trick users by imitating legitimate characters. The second involved Edge and Safari, in which visitors redirected to another website were intercepted by attackers. Code samples are included. Read More

The Powerful Resource of PHP Stream Wrappers

Category: Web Security Readings - Last Updated: Wed, 14 Nov 2018 - by Ziyahan Albeniz
The Powerful Resource of PHP Stream Wrappers

This blog post examines how PHP stream wrappers can be used to bypass keyword based blacklists. It includes an examination of the generic functions that can be used to interact with streams, the concept of stream-context and steam filters. It also looks at PHP wrappers in RFI attacks and bypassing blacklists. Code samples are supplied throughout. Read More