Amateur Security Archaeologists, trying not to break things.

Tag: Security (Page 10 of 11)

Common Web App Defenses

If we step back and think about what customers are up against, it is truly staggering.  Building a secure web application and network are akin to building a nuclear reactor plant. No detail is small and insignificant, so one tiny failure (a crack, weak weld, or a small contamination), despite all of the good inherent in the design and implementation, can mean failure. A similar truth impacts web application security – just one flaw, be it a misconfiguration or omission in the myriad of components, can provide attackers with enough of a gap through which immense damage can be inflicted. And to add insult to injury, these same proactive defensive measures are relied upon in many environments to help detect these rare events (sometimes called black swan events). Network and application administrators have a tough job, and a white-hat’s purpose is to help them and their organization do it better.

Continue reading

Web App Weakspots

I think, were I to be a professional, that web apps would be a significant focus. I don’t have the stones to be a Social Engineering specialist, lack the in-depth OS knowledge to be a malware author, and I haven’t done digital design since vacuum tubes were in vogue (just a slight exaggeration – but I have used those and mag amps!). Web app hacking and pen testing has a fairly low cost of entry – some of the folks I follow show hacks with a browser and their wits. Looking at all of the things that browser can do, it is no wonder why!

Continue reading

What’s Pen Testing All About?

Most folks are starting to gain familiarity with Hollywood’s interpretation of hacking, if not the real-world. Mr. Robot‘s ascension and the rapid-fire news cycle has seen a ton of prominent stories bombard the public. You probably get some interesting dinner conversations 😉 Inevitably, the public’s views of hackers as malicious and evil agents, either working for profit or for an adversarial nation-state, has come to dominate the discussion.

Continue reading

5 Best Practices for Running a Pen-Test

Pen-testing can be a daunting task.  Where do I start, what do I test, and what is important are often questions I hear from people starting this adventure for the first time.  This is a common feeling, and one that I felt as well.  I have compiled a list of 5 of my favorite pen-testing best practices that I have observed as well as learned from others.

Continue reading

CCIE Security Perspective

Hello folks!  I am often asked about CCIE Security preparation.  As a disclaimer, you should know I took the “Latin” version of the exam with Blueprint version 4 (ISE 1.1, legacy IPS, pre-8.2 ASA code, and absolutely nothing cool like Firepower or AMP), so with the release of version 5, things have certainly become much more relevant.  That being said, a lot of the prep resources remain the same. I have started re-using the same base email and scrubbed it for aged-out links (believe it or not I used to have more).  I hope this helps someone. Continue reading

« Older posts Newer posts »
Verified by MonsterInsights