Web Application Security Zone by Netsparker

Exploiting Oracle: Analysis of the Recent RCE Vulnerability in WebLogic Server

Category: Web Security Readings - Last Updated: Fri, 20 Nov 2020 - by Sven Morgenroth
Exploiting Oracle: Analysis of the Recent RCE Vulnerability in WebLogic Server

In October 2020, a critical vulnerability in Oracle WebLogic Server was discovered that allowed for easy remote code execution. Assigned CVE identifier CVE-2020-14882, the issue prompted an out-of-band security update from Oracle. This article takes a closer look at the security flaws that make exploitation possible and demonstrates typical attack payloads. Read More

JSON Web Token Security with Sven Morgenroth

Category: Web Security Readings - Last Updated: Tue, 17 Nov 2020 - by Zbigniew Banach
JSON Web Token Security with Sven Morgenroth

JSON Web Tokens (JWTs) provide a standardized way to exchange information using locally-stored JSON objects. They are used as authentication tokens, especially with single sign-on, and can be digitally signed and encrypted for maximum security. Netsparker security researcher Sven Morgenroth shows how JWT security can go wrong. Read More

Easily Exploitable Vulnerabilities in Oracle WebLogic Server

Category: Web Security Readings - Last Updated: Fri, 13 Nov 2020 - by Tuncay Kayaoglu
Easily Exploitable Vulnerabilities in Oracle WebLogic Server

Two critical vulnerabilities identified in the Oracle WebLogic Server may allow attackers to take complete control of the server. Oracle released patches in October 2020 and advised users to install them as soon as possible. Netsparker has also released an update for Netsparker Standard and Enterprise so you can check if these issues affect your server. Read More

Announcing the Netsparker White Paper: Flexible Deployment Options with Netsparker Scan Agents

Category: Web Security Readings - Last Updated: Thu, 12 Nov 2020 - by Zbigniew Banach
Announcing the Netsparker White Paper: Flexible Deployment Options with Netsparker Scan Agents

Netsparker provides flexible deployment options to align vulnerability scanning with internal development and testing structures. This technical white paper highlights the challenges of dynamic application security testing in complex environments and includes deployment scenarios to show how Netsparker scan agents can be used in a wide variety of situations. Read More

Web Application Security in an Age of Cost Cutting

Category: Web Security Readings - Last Updated: Fri, 06 Nov 2020 - by Zbigniew Banach
Web Application Security in an Age of Cost Cutting

Security has traditionally been among the first victims of cost reductions. At the same time, for countless businesses that rely on web technologies to operate in the pandemic climate, cutting down on web security poses a huge risk. This article shows that organizations can gain far more by wisely focusing their web security budgets than by blindly cutting costs. Read More

Privileged Access Management and Netsparker

Category: Web Security Readings - Last Updated: Tue, 27 Oct 2020 - by Tuncay Kayaoglu
Privileged Access Management and Netsparker

Privileged access management (PAM) allows organizations to centrally store, manage, and secure administrative credentials and other high-value secrets. While it can greatly reduce the risk of data breaches, PAM can also make it harder to fully scan web applications. Learn how Netsparker integrates with PAM solutions to address this challenge. Read More

How Web Shells Work

Category: Web Security Readings - Last Updated: Fri, 16 Oct 2020 - by Zbigniew Banach
How Web Shells Work

A web shell is a malicious script that provides an attacker with a convenient way to launch attacks using a compromised web server. Web shells can provide a permanent backdoor into web applications and related systems. Learn how web shells work, why they are dangerous, and what you can do to detect and prevent them. Read More

Netsparker Survey Reveals Executive Overconfidence in Web Security

Category: Web Security Readings - Last Updated: Tue, 13 Oct 2020 - by Zbigniew Banach
Netsparker Survey Reveals Executive Overconfidence in Web Security

How do web application security policies and programs translate into everyday practice? To find out, Netsparker commissioned a global survey of security professionals, covering a variety of roles and industries. The results should be a wake-up call for all security executives who still believe that all their web applications are secure and regularly tested. Read More

More Than Scanning: Integrating Web Application Security

Category: Web Security Readings - Last Updated: Fri, 02 Oct 2020 - by Zbigniew Banach
More Than Scanning: Integrating Web Application Security

Ensuring security is not a one-off effort but a continuous process that needs to be integrated into the software development and testing workflows. Netsparker tightly integrates with existing tools and processes for maximum effectiveness and automation. This article shows how Netsparker fits into each stage of a secure application development process. Read More

Walk Before You Run: 5 Practical Steps to Enterprise Web Application Security

Category: Web Security Readings - Last Updated: Fri, 25 Sep 2020 - by Zbigniew Banach
Walk Before You Run: 5 Practical Steps to Enterprise Web Application Security

Every modern enterprise needs a solid web application security program, but there’s a long and winding road between making the initial decision and actually getting an effective program in place. This article shows how organizations can plan their actions to see continuous security improvements, as explained by Netsparker CEO Ferruh Mavituna. Read More

Integer Overflow Errors

Category: Web Security Readings - Last Updated: Fri, 18 Sep 2020 - by Zbigniew Banach
Integer Overflow Errors

An integer overflow happens when a program tries to store an integer value that is too big for the declared integer type. Apart from incorrect results and system instability, it can also cause buffer overflows and provide an entry point for attackers. Let's see why integer overflow errors are possible and what you can do to prevent them. Read More

Threat Modeling for Web Applications

Category: Web Security Readings - Last Updated: Fri, 11 Sep 2020 - by Zbigniew Banach
Threat Modeling for Web Applications

Threat modeling in cybersecurity is a way of identifying, listing, prioritizing, and mitigating potential threats in order to protect systems and data. This article shows how threat modeling works, how it applies to web application security, and why you should use it in your secure development process. Read More

The Difference Between Red Teaming and Penetration Testing

Category: Web Security Readings - Last Updated: Fri, 28 Aug 2020 - by Zbigniew Banach
The Difference Between Red Teaming and Penetration Testing

Red teaming is a way of testing security by simulating a real-life attack. Though often confused with penetration testing, red teaming has different objectives and uses different methods, often including physical security testing. This article looks at the differences between red team exercises and penetration testing to help you choose the best approach. Read More

5 Advantages of Ongoing Vulnerability Management Over Ad-Hoc Scanning

Category: Web Security Readings - Last Updated: Wed, 26 Aug 2020 - by Zbigniew Banach
5 Advantages of Ongoing Vulnerability Management Over Ad-Hoc Scanning

Why do organizations scan their websites and web applications for vulnerabilities? The question is not as silly as it seems, since many organizations treat vulnerability scanning as a precaution, not an integral part of their workflows. This article examines the advantages of systematic vulnerability management as compared to ad-hoc scanning. Read More