fbpx

This website uses cookies to ensure you get the best experience. More Information...

SECURITY LABS

Web Application Security Brochure

Web Applications are a direct target for attacks, as they are directly accessible from all parts of the world and form a surface to valuable information and, many times, Personally Identifiable information (PII) such as credit cards, identity numbers, health information, etc. Each year, web-borne attacks are increased by 30%, while successful breaches reach up […]

READ MORE
Threat Management Brochure

Organizations have already made significant investments in order to implement best‐of‐breed, multi‐layered information security architectures, adopting in a relatively small timeframe a multitude of technologies such as Firewalls, Intrusion Detection Systems, Web Application Firewalls, Anti-virus / Anti-spam / Anti-phishing systems, etc. in a never‐ending race of improving their security posture and being able to cope […]

READ MORE
Client Side Penetration Testing – T&T Part 2

Upon being able to contact the target and sound legitimate, we should be able to have a binary executed through persuasive and undetectable techniques. Below we discuss some of these techniques: PowerPoint presentation with embedded .exe A legitimate and undetectable by AntiVirus method to deliver an executable (if the executable itself is undetectable of course), […]

READ MORE
Obrela Security Industries Advisory (OSI-1502)

Advisory ID  OSI-1502 Description: Dnsmasq does not properly check the return value of the setup_reply() function called during a tcp connection (by the tcp_request() function). This return value is then used as a size argument in a function which writes data on the client’s connection.  This may lead, upon successful exploitation, to reading the heap […]

READ MORE
Vulnerability in Windows http.sys could allow DOS or remote code execution

Yesterday Microsoft has patched a critical vulnerability in Windows HTTP stack (http.sys), which would have extreme consequences if an exploit is publicly disclosed. Up until this writing (15-04-2015 17:00) no public exploit exists. The vulnerability is assigned CVE-2015-1635 and MS15-034. Where is it based? Using a specially crafted HTTP GET request, an attacker can trivially […]

READ MORE
The Swordfish Project

The SWORDFISH project aims to develop a prototype security management platform capable to support and secure dependable infrastructures mainly through its ability to merge information security with the physical security world and the business process (the human factor). This approach can give enormous capabilities to organizations or communities of organizations to secure their assets and […]

READ MORE
Client Side Penetration Testing – T&T Part 1

Most client side attacks are based on delivering emails to the target, nevertheless by underestimating the need to build an adequate “trust level” towards the target, there’s a fair chance that the exercise will fail even at this early state. Below we will begin by listing some techniques, considerations and tips on how to successfully […]

READ MORE
Obrela Security Industries Advisory (OSI-1501)

Advisory ID  OSI-1501 Description: The XML parser of Cisco Prime Service Catalog suffers from a vulnerability that could allow an authenticated remote attacker to either cause denial of service conditions (resources consumption) or retrieve sensitive data (local data access). Researcher: Alexis Dimitriadis (a.dimitriadis[a t]obrela[do t]com) Vulnerability: CVE-2015-0581: Cisco Prime Service Catalog XML External Entity Processing Vulnerability […]

READ MORE
Major Internet Explorer Vulnerability Publicly Disclosed Today

Update: As estimated, the community has responded to this public disclosure 4 days after it was announced. MS has been notified Oct-2014. CVE assigned is CVE-2015-0072. Today a vulnerability was disclosed (no CVE) on seclists.org by the security company called Deusen. The mechanics and PoC were also disclosed, proving that the same origin policy of […]

READ MORE