And PHP Upgrade Breaks Things I use PHP+Wordpress for a security blog, yes there is irony here. I mostly do this because I’m too lazy to use other mechanisms and this maintenance also helps me to learn about technologies so that I can help others. And now it’s time to update PHP because, you know, security issues. And of course… Read More
Swinging the Compliance Hammer at Obsolete Crypto Abstract Many applications still utilize older cryptographic technologies, even though security professionals warned that these are obsolete and unsafe to use. Some implementations can easily be upgraded to current encryption and contain a graceful fall-back for situations where it’s required, such as when a remote party only supports legacy technologies (e.g., TLS downgraded connections). Other… Read More
Updated AWS S3 Bucket Auto-Encryptor Released A vastly updated version of my AWS S3 Bucket Auto-Encryptor has been released! Zocdoc‘s ZocSec.SecurityAsCode initiative focuses on delivering Security by automating detection and remediation of security issues across an AWS environment. With our Security as Code techniques, you can greatly reduce time from detection to resolution and minimize impact to the business. ZocSec is… Read More
Image Location & Privacy Scanner, Official Release, v1.0 It’s Here, Version 1.0 The Official v1.0 release of the Image Location & Privacy Scanner has arrived! This security tool plugin for Burp or OWASP ZAP security proxy tools will scan images for privacy exposure including GPS locations, camera serial numbers, even facial recognition tags. See my presentation about this software at this link. Version… Read More
Painless Password Hash Upgrades Background & Summary Existing websites and applications implementing an older password hashing algorithm like MD5 or SHA1 must be upgraded to a more secure algorithm. Both of these older algorithms are obsolete & breakable and if an attacker obtains those hashes from a lost backup tape or website vulnerability, the attacker could make quick work… Read More
Accidental Offensive Security: Analysis of Buffer Overrun in a Security Tool Note: I originally posted this blog entry on the Aspect Security blog around 2017-03-16. I am mirroring it here with only formatting changes. Introduction During a project working with Hydra, a Network Login Auditor, we discovered and corrected a buffer overrun issue with possible security implications that might include the auditor being attacked by the… Read More
Image Location & Privacy Scanner v0.4 New Version: Image Location & Privacy Scanner v0.4 I have completed another update of the Image Location & Privacy Scanner, a plugin for Burp or OWASP ZAP security proxy tools. More camera types have their serial numbers detected. With some Panasonic camera, it will also give the name and age of the person in the… Read More
PolarSSL Security Snowstorm – Tools Could Not Save Us Note: I originally posted this blog entry on the Aspect Security blog around 2015-02-13. I am mirroring it here with only formatting changes. Introduction The spat of SSL and TLS issues over the last year have caused concern about the quality of the encrypted tunnel in Internet communications. The various creatively named BEAST, CRIME, &… Read More
Image Location & Privacy Scanner v0.3 Announcement: Image Location & Privacy Scanner v0.3 I have completed a large update of the Image Location Scanner software; so many new features in fact, it gets a new name: “Image Location & Privacy Scanner”. It now detect serial number from the cameras in scanned images and even the camera owner’s name from some Canon… Read More
How to track down your Ex(if) – talk given 26 feb 2015 How To Track Down Your Ex(if) Adding Jpeg Exif detection to your penetration regiment and learning how to practice Safe (s)Exif Abstract: We unintentionally distribute GPS data with every photograph, including indoor pictures. This talk will describe a real-world scenario involving remote education site where teachers & students exposed their confidential home address via profile… Read More