Web Admin Blog

Real Web Admins. Real World Experience.

Entries for the ‘Security’ Category

Coding Secure with PHP – OWASP AppSec NYC 2008

This presentation was by Hans Zaunere, Managing Member, and it is entitled “PHundamental Security – Ecosystem Review, Coding Secure with PHP, and Best Practices”.  Take a look at http://www.nyphp.org/phundamentals/ for the ongoing guide and best practices.  Guru Stefan Esser recently presented an excellent talk at Zendcon. Security fundamentals are common across the board.  Different environments […]

Mastering PCI Section 6.6 – OWASP AppSec NYC 2008

This presentation is by Jacob West in the Security Research Group and Taylor McKinsley in Product Marketing from Fortify software.  I’d like to note that Fortify is a developer of a source code analysis tool and so this presentation may have a bias towards source code analysis tools. 56% of organizations fail PCI section 6.  […]

Enterprise Security API – OWASP AppSec NYC 2008

This presentation was by Jeff Williams, OWASP Chair, on the Enterprise Security API. Vulnerabilities and Security Controls Missing – 35% Broken – 30% Ignored – 20% Misused – 15% Goal is to enable developers.  Need to give them hands-on training, a secure coding guideline, and an Enterprise Security API. The problem with Security Libraries: overpowerful, […]

New 0Day Browser Exploit: Clickjacking – OWASP AppSec NYC 2008

This talk was rumored to have been cancelled at a vulnerable vendors (Adobe) request, but Jeremiah Grossman and Robert Hansen decided to do parts of the talk anyway.  Here’s my notes from the semi-restricted presentation. Jeremiah started off with a brief introduction on what clickjacking is.  In a nutshell, it’s when you visit a malicious […]

Get Rich or Die Trying – OWASP AppSec NYC 2008

Unfortunately, the conference provided lunch today, but did not provide us time to eat it so I had to eat while listening to this talk.  It was by Trey Ford and Jeremiah Grossman from Whitehat Security and I’m pretty sure they’ve done it before.  You may even be able to download a copy of the […]

Consider Your Hotel Network Hostile

As I’m preparing to take my trip to New York for the OWASP AppSec Conference, I came across a timely article on the risks involved with using a hotel network.  The Center for Hospitality Research at Cornell University surveyed 147 hotels and then conducted on-site vulnerability testing at 50 of those hotels.  Approximately 20% of […]

Two Simple Ways to Read Restricted Website Content

Have you ever had a problem that you used a search engine to try to find the solution?  Did that search bring you results from a site that then forced you to register in order to see the content?  This happened to me all of the time before I found two simple ways to display […]

An Evaluation of Rapid7 NeXpose

I’ve been focusing a lot of my time lately on our PCI initiatives.  One sub-topic that I’ve spent a particularly large amount of time on has been Requirement 11.2 which says that you need to have internal and external network vulnerability scans performed by a scan vendor qualified by PCI.  We already employ one such […]

Small and Medium-Sized Companies Too Small to Get Hacked

McAfee released the results of a survey last week after sampling 500 IT decision-makers from companies with 1,000 to 2,000 employees.  The results are pretty astounding.  Forty-four percent think that cybercrime is only an issue for larger organizations and believe it does not affect them.  Fifty-two percent believe that because they are not well known, […]

Google Ratproxy

If you are responsible for developing or maintaining a website and haven’t checked out Ratproxy yet, you’re missing out. Before I start spouting off about just how cool and useful this tool is, I suppose I should first tell you what a proxy is. In a nutshell, a proxy is an application that runs local […]