Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 30 March 2010

A couple of neat things about WebInspect

Posted on 17:14 by Unknown
If you're into finding the Web security flaws that matter HP's WebInspect should be on your short list of prospective Web vulnerability scanners. Over the past six months WebInspect has repeatedly found a couple of items that I know I otherwise wouldn't have uncovered or been able to exploit to the extent I did.

The first is SQL injection. WebInspect does a very good job finding the actual flawed inputs but really stands out when it comes to exploiting the vulnerabilities - something that proves highly valuable during security assessments. Recently, I came across an application that had authenticated SQL injection that was only exploitable at one role level - which was, of course, the unexpected one. The following is a screenshot of WebInspect's SQL Injector in action showing it's appropriately named "Data Pump" function.



















You often have to tinker and be persistently patient with SQL Injector to get it to exploit a SQL injection flaw...and it does have its false-positive moments hence the need for detailed manual verification. But man, when it gets rolling, look out.

The second thing about WebInspect is its ability to uncover the usage of HTTP GET requests in an otherwise POST-centric world. As with SQL Injector, some are false positives so you have to manually verify that the finding is indeed a problem. But if you can confirm the issue your efforts will pay off because HTTP GET requests can "get" your users and your business in a real bind...It's a big enough problem and such a common finding that it inspired me to write this article: Why use POST vs. GET to keep applications secure.

I could go on with more good things about WebInspect but I'll save that for another time. Until then, don't forget my firm belief that you almost always get what you pay for when it comes to Web vulnerability scanners...there's just too much at stake not to invest in a good tool such as this.
Read More
Posted in cool products, penetration testing, security testing tools, web application security | No comments

Monday, 29 March 2010

Don't forget about XSS *behind* the login prompt

Posted on 08:40 by Unknown
Don't assume that your Web security concerns stop at the login prompt. Here's a new piece I wrote where I talk about cross-site scripting (XSS) and whether or not it matters for logged-in users:

Authenticated XSS - problem or not?
Read More
Posted in cross-site scripting, penetration testing, vulnerability assessments, web application security | No comments

Got Linux security on your mind?

Posted on 03:05 by Unknown
Here's a new webcast and accompanying podcast I recently recorded for SearchEnterpriseLinux.com where I share some insight and opinions regarding the biggest weaknesses I'm seeing with Linux today...and what you can do about it:

Tightening down Linux security (webcast)

Tightening down Linux security (podcast)
Read More
Posted in Linux, security assessments, vulnerability assessments | No comments

Saturday, 27 March 2010

Windows DirectAccess - VPN killer or not?

Posted on 08:25 by Unknown
Here's a new piece I wrote for SearchEnterpriseDesktop.com on Windows 7's/2008's new DirectAccess app:

Using Windows 7's DirectAccess to enhance the mobile user experience

...it's actually pretty cool and worth checking out.
Read More
Posted in mobile security, remote access security, telecommuting, Windows 7 | No comments

Friday, 26 March 2010

Why the rich keep getting richer and the poor keep getting poorer

Posted on 10:00 by Unknown
Contrary to what Senator Max Baucus (Democrat) recently said about the forthcoming healthcare deform that's being forced upon us:
“Too often, much of late, the last couple three years the mal-distribution of income in America is gone up way too much, the wealthy are getting way, way too wealthy, and the middle income class is left behind. Wages have not kept up with increased income of the highest income in America. This legislation will have the effect of addressing that mal-distribution of income in America.”

The rich keep getting richer because they keep doing the things that make them rich. The poor keep getting poorer because they keep doing the things that make them poor. It's basic logic just like the "secret" to losing weight: eat less, exercise more. People just don't get these basics of life. It's why so many people buy into the nonsense the diet companies and politicians "feed" us. This mindset explains why this book and its philosophy make so much sense.

Everything in life is a personal choice. Where we are in life today is the exact sum of all the choices we've made up to this point.

Interestingly, information security is no different - you choose the behavior (i.e. ignoring the problem) you choose the consequence (i.e. security breach).


Read More
Posted in government regulations, politics, security leadership, stupid security, success | No comments

I do not like it Uncle Sam

Posted on 06:32 by Unknown
Here's a good one going around the Internet that I just love:

I do not like it Uncle Sam, I do not like it Sam I am. I do not like these dirty crooks, I do not like how they cook books. I do not like when Congress steals, I do not like their secret deals. I do not like this Speaker Nan, I do not like this 'YES WE CAN'! I do not like this kind of hope, I do not like it, nope! Nope! Nope!
Read More
Posted in government regulations, politics | No comments

Great tool to check for weak Web passwords

Posted on 05:46 by Unknown
I've always been a fan of Acunetix Web Vulnerability Scanner. It's a lesser-known tool that packs a big punch. One of its most redeeming qualities is its password checking. As I mentioned in this post, Acunetix Web Vulnerability Scanner took what was going to be a basic assessment of an Outlook Web Access system with very few findings up many notches into a true penetration of the system...all thanks to the built-in password checks it does by default.

I've since had other scenarios where it has done the same thing and left me wondering why are other scanners finding these holes!?

The following screenshot shows some of the Acunetix Web Vulnerability Scanner password check policy settings.



















The scanner not only checks for weak Web passwords but also weak FTP, POP3, SMTP, and telnet, and others as well.

I'm still waiting for some good brute-force checks built into these tools (a la Brutus) and - especially - better handling of login forms. If/when this occurs I honestly think we could eliminate a huge chunk of the directly-exploitable Web flaws out there. In fact, I'm really surprised that other scanners aren't doing more in this area.

I'm confident that many - if not most - Web sites/apps that are deemed "secure" are just one weak password away from getting hacked...the weak passwords are there, they're just being overlooked. Unless and until we start seeing better password-cracking capabilities built into all mainstream Web vulnerability scanners this flaw will remain and surface its ugly head in any given system. It's just a matter of time.
Read More
Posted in cool products, passwords, penetration testing, security testing tools, vulnerability assessments, web application security | No comments

What's the biggest Web vulnerability?

Posted on 05:02 by Unknown
Here's a new piece I wrote called The Top Web Vulnerability We Face. It's something I suspect will be around for a long, long time. I'm curious if you agree?
Read More
Posted in stupid security, web application security, web server security | No comments

Tuesday, 23 March 2010

Users *have* to start locking their screens when working remotely

Posted on 12:16 by Unknown
To continue on with the message in this previous post about users locking their screens while away from their computers I'm amazed at how naive people are with their computer usage in public places.

I see it practically every time I'm at a coffee shop - someone leaves his/her laptop sitting at the table while he/she goes out to take a phone call, use the restroom, smoke a cigarette, talk with an employee across the store and provides someone with ill-intent enough time to snatch the computer away or, in some cases, sit there and monkey around with the computer.

All it takes is about 60 seconds for someone to hop onto an unsecured computer, access sensitive files stored locally or via the corporate VPN and then delete them or email them out.

Combine this vulnerability with unencrypted hard drives and Microsoft's new always-on mobile intranet connection called DirectAccess and you've got yourself a big problem on your hands.
Read More
Posted in locking screens, mobile security, stupid security, user awareness, Windows 7, windows security | No comments

Check out my new Web application security ebook

Posted on 10:14 by Unknown
Hot off the press...OK, hot off the computer - I've written an ebook on Web application security threats published by SearchSoftwareQuality.com - a great application development/QA site that's part of the TechTarget family.















Download it and learn more about:

  • New Web application security challenges
  • Assessing your Web application security
  • Beating common Web security attacks
  • Hacking your own applications
  • Web application security best practices
It's free - just sign up for it at Bitpipe.com.
Read More
Posted in Kevin's books, web application security, whitepapers | No comments

Great quote on business and career success

Posted on 07:59 by Unknown
Harold Geneen once said "In business, words are words, explanations are explanations, promises are promises, but only performance is reality."

Reminds me just how cheap talk can be when the marketing machine gets its way - especially with "cloud computing". Look more at the actions of businesses and people and less at the words. There you'll find what they're made of.
Read More
Posted in careers, cloud computing, customer no service, marketing hype, security leadership, success | No comments

Monday, 22 March 2010

Our power of choice has been stripped

Posted on 08:14 by Unknown
No need for us to think any more. Here's a great excerpt from a WSJ piece that underscores the issue:

"In our world of infinite wants but finite resources, there are only two ways to allocate any good or service: either through prices and the choices of millions of individuals, or through central government planning and political discretion."

You hear me say a lot that those in control of information security have a choice in the matter...and, as Dr. Phil McGraw says, you choose the behavior you choose the consequences. So be it.

But we individuals in our own personal lives here in America are losing our ability to choose. It's our new reality with Obamacare and, I suspect, many many other things to come. The politicians know better than the people...and it's all our fault.

I'm going to miss the days when we were in control of ourselves...when we were free.

You probably think I'm crazy. I really don't believe I am...I just see what has happened since the beginning and understand what all of this government control will lead us to. The decisions made this weekend will change our country deeply forever. Everyone will understand sooner or later.
Read More
Posted in government regulations, politics, scary stuff, stupid security | No comments

Are you destroying your backup media the right way?

Posted on 07:39 by Unknown
Here's a recent podcast I recorded on backup media data destruction...better be sure you're doing it the right way:

Ensuring proper data deletion or destruction of backup media
Read More
Posted in backups, compliance, data destruction, Kevin's security content, storage security | No comments

A sincere "Thanks!"

Posted on 04:30 by Unknown

Frederic Bastiat once said "When plunder becomes a way of life for a group of men living together in society, they create for themselves in the course of time a legal system that authorizes it and a moral code that justifies it."

In the same spirit, I want to send out a sincere and heartfelt Thanks! to all my fellow Americans who voted for "Hope" and "Change" putting a Marxist-loving community organizer into power that has led to the passing of this healthcare "reform"monstrosity.

Specifically,

  • I want to thank all the people who cannot think long term.
  • I want to thank all the people who do not take responsibility for their own choices and actions.
  • I want to thank all the people who vote for a living.
  • I want to thank all the people who use the police power of government to mooch off of others who actually work for a living.
  • I want to thank all the people who believe that government can solve all their problems.
  • I want to thank all the people whose selfish dependence on government takes top priority above all.
  • I want to thank all the people for supporting politicians who want to force their ideals upon us for the sole reason of gaining control of us and maintaining their own political power.
  • I want to thank all the people for supporting politicians who could only pass a bill by manipulating and cheating a well-defined set of rules and procedures.
  • I want to thank all the people who believe that Socialism and Communism are "other people's problems" - things that America could never evolve into.
  • I want to think all the people who voted for George W. Bush and all the other spineless Republicans who have played a big part in where we're at today.
And finally,
  • I want to thank all the people whose desire for "Hope" and "Change" have helped diminish the opportunities this country had to offer my kids and my future grandkids and, instead, created a scenario for everyone to work harder with less payoff.

I'm just furious at what we've let this country become. The wars that have been fought...the lives that have been lost...the toil our Founding Fathers endured....All of that to end up like this.

Shame on us.


Read More
Posted in government regulations, politics, scary stuff, stupid security | No comments

Email security - using content filtering and incident response to round things out

Posted on 03:34 by Unknown
Here are some recent bits I wrote for SearchWinIT.com and SearchExchange.com to help you flesh out the security of your email environment:

The state of email content filtering - and what you can do

Solidify your Exchange email server incident response plan
Read More
Posted in employee monitoring, exchange, incident response, Kevin's security content, security policies | No comments

Friday, 19 March 2010

All the reasons you need to NOT buy security products

Posted on 14:11 by Unknown
We've all been subjected to the marketing hype the IT and security product vendors put out daily...Well, if you've been looking for ways to save some money, here's why you should not buy information security products:

9 good reasons not to buy information security products

...the marketing madness will never cease. We just have to grow wise and understand what to buy into and what to ignore.
Read More
Posted in compliance, Kevin's security content, marketing hype, stupid security, vendors | No comments

New tips on 4 facets of encryption

Posted on 10:49 by Unknown
Been wondering about the latest on mobile/backup/database/email encryption? Well, here are some recent tips I wrote to TechTarget that'll help you get the ball rolling:

Securing SMB laptops

Securing removable media with BitLocker To Go

Secure your data backups with encryption key management best practices

Encryption – the great security control that nobody’s using

The true value of transparent data encryption

Is full email encryption the solution to Exchange security?
Read More
Posted in backups, bitlocker, compliance, database security, drive encryption, encrypting data in transit, Kevin's security content, sql server | No comments

No need to fix the problem, just ban the tool

Posted on 04:43 by Unknown
Here's a great post from my colleague Dave Paradi talking about how a conference is banning presenters from using PowerPoint. It's an embedded systems conference. So they're telling these highly-technical people they can't use PowerPoint to get their messages across!? I suspect the audience will instead be subjected to overhead transparencies and slide rule demonstrations. Sounds like a great show!

This is just like businesses banning thumb drives and instant messaging on their networks. The ignorant powers that be proclaim "This stuff is too risky so we're going to ban it." Instead of fixing the problem at a higher level and putting in the proper controls to minimize such risks they just ban the technologies altogether.

It'll be tough for presenters at this conference to "sneak" PowerPoint into their presentations. But what happens when computer users are told they can't use certain hardware or software? They find a workaround and do it anyway because the problem isn't addressed at the right level. And thus the cycle continues. Amazing stuff.
Read More
Posted in presentations, security leadership, stupid security | No comments

Thursday, 11 March 2010

Unexpected vulnerabilities in the cloud?

Posted on 09:34 by Unknown
When you look past all the ridiculous hype and craze over "cloud computing" the realities set in. Here's a new piece I wrote for SearchCompliance.com that can help set you straight:

Find unexpected vulnerabilities to ensure cloud compliance
Read More
Posted in cloud computing, compliance, Kevin's security content, marketing hype | No comments

Twitter stole my Twitter idea

Posted on 08:29 by Unknown
I was recently talking to a client about how we need to start up a company with a Twitter acquisition as our exit strategy that scans for malicious URLs in the tinyurl, bit.ly, etc. links that are posted on Twitter. Twitter beat us to the punch. It's actually pretty difficult to comprehend that it's taken them this long to fix such a big problem. Nice to see some innovation where it's really needed.
Read More
Posted in malware, twitter, web application security | No comments

Trouble getting policy buy-in? Make 'em self-executing.

Posted on 08:00 by Unknown
If you're having trouble getting security policies on the radar of management and users - much less getting the real buy-in you need, don't fret - there is a possible solution.

It's an idea I got from Louise Slaughter (good name for a politician) and her attempt to force Obamacare on us. Simply make your policies "self-executing". In other words, you write the policies and include verbiage in each one that makes them take effect without any buy-in, votes, or opinions whatsoever.

Imagine if it were this simple for anyone but politicians to manipulate the system in their favor. Now that would be information security change we could believe in!
Read More
Posted in government regulations, politics, security policies, stupid security | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ►  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ▼  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ▼  March (21)
      • A couple of neat things about WebInspect
      • Don't forget about XSS *behind* the login prompt
      • Got Linux security on your mind?
      • Windows DirectAccess - VPN killer or not?
      • Why the rich keep getting richer and the poor keep...
      • I do not like it Uncle Sam
      • Great tool to check for weak Web passwords
      • What's the biggest Web vulnerability?
      • Users *have* to start locking their screens when w...
      • Check out my new Web application security ebook
      • Great quote on business and career success
      • Our power of choice has been stripped
      • Are you destroying your backup media the right way?
      • A sincere "Thanks!"
      • Email security - using content filtering and incid...
      • All the reasons you need to NOT buy security products
      • New tips on 4 facets of encryption
      • No need to fix the problem, just ban the tool
      • Unexpected vulnerabilities in the cloud?
      • Twitter stole my Twitter idea
      • Trouble getting policy buy-in? Make 'em self-execu...
    • ►  February (11)
    • ►  January (10)
  • ►  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ►  October (21)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile