AppSec Blog

Free AppSec Webcasts

Here are some recent appsec webcasts for your viewing pleasure: - Web Application Threats: Combining XSS and CSRF to own the world! Kevin Johnson covers Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). Specifically, "how they can be used to exploit users and applications, how to find them and what their combined power can accomplish." … Continue reading Free AppSec Webcasts


Hard-Coded Password in Critical SCADA Software

Wired reports that a new piece of malware is using a hard-coded password in Siemens' Simantic WinCC SCADA system to access the underlying MS SQL Server database which contains information used to manage critical utilities and manufacturing facilities. The article quotes Joe Weiss as saying "Well over 50 percent of the control system suppliers" have … Continue reading Hard-Coded Password in Critical SCADA Software


Trio of AppSec Webcasts Next Week

We have three cool webcasts lined up next week: 1) SQL Injection for the Penetration Tester on April 27 Eric Conrad will kick off the week of webcasts with something every penetration tester should know about. "Both normal and blind SQL attacks will be described, including reading and altering databases, creating local files, and gaining … Continue reading Trio of AppSec Webcasts Next Week


Webcast on Manipulating Web Application Interfaces

Felipe Moreno will be giving a webcast on Groundspeed, a Firefox add-on that allows penetration testers to manipulate the interface of web applications in order to adapt it to penetration test needs, removing the annoying client-side limitations and making the test more efficient. "Not much has changed since the beginning of the web application penetration … Continue reading Webcast on Manipulating Web Application Interfaces


Top 25 Series - Summary and Links

As requested here are the links to all the posts on the Top 25 Most Dangerous Programming Errors. Please let us know if you have any suggestions or comments. 1 - Cross-Site Scripting (XSS) 2 - SQL Injection 3 - Classic Buffer Overflow 4 - Cross-Site Request Forgery (CSRF) 5 - Improper Access Control (Authorization) … Continue reading Top 25 Series - Summary and Links