Posts by Administrator:

What’s HOT in Application Security Vol#6

Mar 26, 2012 By Administrator | Application Security- Not Sufficient!
A study was recently conducted among 800 It executives which found that there is a huge difference between the perception of Security from the viewpoint of the developer and security professionals. Security professionals view the applications in a far more optimistic light- stating that they are secure enough, whilst developers say that their applications run in their enterprise are no way near secure enough.

</Read More>

Security Digest March 15 – March 18 – 3 vulnerabilities

Mar 18, 2012 By Administrator | What a busy week it was. Endless critical vulnerabilities were found in major platforms. I decided to focus on three of them 1) (CRITICAL) RDP Remote code execution – you server allows incoming RDP (Terminal Server)? The most probably people can gain admin access without having a valid name and password:

</Read More>

What’s HOT in Application Security Vol #4

Mar 11, 2012 By Administrator | Where is NASA’s security?
5,408 successful eruptions since 2009, 48 stolen laptops and mobile devices,47 advanced persistent threats (APTs) and 13 that managed to jeopardize thousands of NASA’s computers causing serious damage and leaving NASA with an approximated $7 million bill. http://www.space.com/14750-stolen-nasa-laptop.html

</Read More>

What’s HOT in Application Security Vol #3

Mar 07, 2012 By Administrator | Let’s understand the web application security dilemma! Organizations within the financial services industry track an average of 800 attacks, organizations out with the financial services industry track an average of 500 attacks- no wonder it’s so vital to understand application security. It’s said that the security challenge is due to the fact that most of these applications are web enabled. Companies which rely on SAAS and applications that are operating from portable devices are also at an increased risk as they are by definition, web enabled. Why even worry about application security?

</Read More>
Application-Security-News-Thumbnail

What’s HOT in Application Security Vol #2

Feb 28, 2012 By Administrator | Mobile banking threats
Millions of consumers are currently using mobile banking – which is expected to be the next major target for hackers. As banks are focusing resources in securing mobile applications, two important precautions developers must take into account include:

</Read More>

What’s HOT in Application Security Vol #1

Feb 20, 2012 By Administrator | Hackers in China accused of a long term breach of Nortel For almost ten years Chinese hackers gained complete access to the internal network of Nortel Networks, Ltd. Nortel was previously considered to be a telecommunications power house but has been struggling financially in recent years. The hackers stole several passwords from top Nortel executives (who were apparently working in China) sometime during the year
2000 and over the years downloaded a range of technical papers, business plans and employee information- this information is according to Brian Shields, who is now leading the internal investigation.

</Read More>

LDAP Injection

Jan 15, 2012 By Administrator | LDAP Injection (CWE: 90) is an attack allowing the attacker to modify LDAP queries. Recently, I encountered a nice LDAP Injection – and I started asking myself why do we hear so little about such vulnerabilities?
I would expect the opposite.

</Read More>

SQL Sanitization

Jan 11, 2012 By Administrator | This is really funny!
I attended a presentation the other day. The presenter said that in order to avoid SQL Injection for string parameters, it is possible to double quotes.

</Read More>

Path Manipulation, Directory Traversal, and interesting JAVA code

Jan 10, 2012 By Administrator | Directory Traversal Attacks
Directory Traversal (CWE: 22) is usually considered a subset of Path Manipulation (CWE: 73). Directory Traversal, also referred to as Path Traversal,  attacks occur by manipulating variables with the ‘../’ (dot-dot-slash is another name this attack sometimes goes by) sequences, and attempt to access directories and files stored in a system. Path Directory traversal attacks are usually aimed at gaining access to application source code and critical system files and is placed at #13 on the SANS Top 25 Most Dangerous Software Errors. Directory Traversal attacks can be aimed at the web server, or the application code, and attacks are successful when neither the root directory or the Access Control Lists correctly restrict user access. The difference between Directory Traversal and other security issues is that while many security issues are caused by coding flaws and holes in the code, Directory Traversal attacks are enabled by a lack of security.  
Path Manipulation Attacks
Very often, when I give lectures about application security, I start with a path manipulation example. Path manipulation vulnerabilities are possible when user-controlled data is put in a URL or file and is saved on the server. Once on the server, an attacker could modify the path and gain access to other files held on server.
I’ve found that while developers can easily understand the risk Directory Traversal and Path Manipulation attacks can pose,  it’s relatively complicated to avoid it correctly. This has taught me that discussing this attack gives a great background for discussions on more complicated attacks.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.