Blog

Blog

OpenVPN Externally Shellshocked

Two days ago Fredrik Strömberg reported that OpenVPN, under certain configurations, made servers externally vulnerable to the Shellshock bug. The configuration problem stems from a number of options that call custom commands at different tunnel session stages. Upon calling many of these commands, environmental variables are set, with clients controlling some of them. The command “auth-user-pass-verify” is […]

Read More

Shellshock: Treatment Underway

It appears that Red Hat assurances regarding updates released thus far to fix bash vulnerabilities have unleashed an Lernaean Hydra effect, spawning and spurring the discovery of several more bugs. Exploit Mechanics and Attack Vectors To recap, the bash bug, now around 22 years old dating back to version 1.13, allows attackers to interact with […]

Read More

Bashing Linux Security – The Shellshock Exploit

Bashing Linux Security – The Shellshock Exploit On Wednesday the world awoke to a substantial vulnerability in the Bourne again shell, otherwise known as bash.  Bash is a UNIX like shell which was created in 1980.  It is now a far cry from the simple terminal based command interpreter it used to be, having grown […]

Read More

PACK AND PIPAL – A COMPARISON

PACK AND PIPAL – A COMPARISON During testing we frequently come across passwords and in most cases, though not all, they are encrypted.  Like in the real world, we will attempt to decrypt these passwords using password cracking tools.  There are many options for password cracking tools but we have recently done some analysis on […]

Read More

Drupal and WordPress Denial of Service

Drupal and WordPress frameworks are vulnerable to a denial of service condition within the XML-RPC service. Details of the issue can be found here on the official sites for Drupal and WordPress. Basically the attack works by sending an XML-RPC call to the remote site with an initially small XML document. This element of the […]

Read More

Day Two OWASP AppSec EU

So after a busy day at my graduation, I had the opportunity to fly out for day two of OWASP AppSec EU. An opportunity I took, naturally. Having been to a number of OWASP chapter meetings but never an AppSec conference, I was very much looking forward to it. I am happy to report that, […]

Read More

Security Testing – A Buyer’s Guide

Know what you’re asking for and what to expect People often ask for penetration testing without knowing what it really means or does. The word has become ubiquitous within the field of information security and means very different things to individuals and organisations. Even security professionals are at fault here, interchanging words such as pen […]

Read More

PCI DSS V3 in a Nutshell

The following blog post outlining PCI DSS V3 in a nutshell has been submitted by two students from Glasgow Caledonian University. This is part of our approach to work closely with local universities to provide vital hands on experience for undergraduates. What is PCI DSS and why is it required? As many of you will be aware […]

Read More

How Card Payments work and PCI DSS

How Card Payments work and PCI DSS The following blog from our Principal Security Consultant, first published back in 2011, provides a great high level primer for those who are not familiar with the underlying processes and terminology around PCI DSS. This may be particularly useful for small businesses who are just starting out with […]

Read More

Multiple vulnerabilities in Thecus NAS

Introduction During an internal infrastructure test last year, we identified a Network Attached Storage (NAS) device that piqued our interest, primarily due to the administration web page being served over HTTP and not HTTPS. Generally not a good sign from a security point of view! A few moments later and with access to the device […]

Read More