CGISecurity Logo
  • Announcing SecTemplates.com release #6: Security Partner Program Pack v1

    I have built several security partner programs at companies such as Box Inc. and Coinbase, with over 8 years of experience leading them. I have consistently observed the benefits of a partner-focused model versus a classical consultancy model within medium to large enterprises. I’m pleased to announce our 6th program pack, the Security Partners Program…

    Read more of this story…

  • Announcing SecTemplates.com release #5: Security Exception Program Pack 1.0

    The goal of this release is to provide all the necessary resources to establish and set up a fully functioning security exceptions program at your company. – Robert Auger (@robertauger) In this pack, we cover: Security Exception Definitions: This document describes common terminology used in an exceptions process, outlines definitions for the various stakeholders participating in…

    Read more of this story…

  • Announcing SecTemplates.com release #4: Vulnerability Management Program Release Pack 1.0

    I’m pleased to announce our fourth release, the Vulnerability Management Program Pack. The goal of this release is to provide everything you’d need to establish and setup a fully functioning vulnerability management program at your company. – Robert Auger (@robertauger) In this pack, we cover: Vulnerability Level Definitions: This document outlines vulnerability severity levels to help your…

    Read more of this story…

  • Announcing SecTemplates.com release #3: Bug bounty program pack 1.0

    Introduction There are numerous considerations beyond selecting a provider, many of which are often overlooked in public documentation. The goal of the Bug Bounty Program pack is to help people quickly ramp up on the topic, providing them with the  necessary information to begin their journey and ultimately launch a program.– Robert Auger (@robertauger) Announcement:https://www.sectemplates.com/2024/07/announcing-the-bug-bounty-program-pack-10.html…

    Read more of this story…

  • Announcing SecTemplates.com release #2: External penetration testing program pack 1.0

    In addition to CGISecurity I work on other side projects from time to time. Below is my second announcement from my latest project. Introduction I have built out several penetration testing programs, both internally and externally at companies such as eBay, Paypal, and Box to name a few. Before you have the resources for an…

    Read more of this story…

  • Announcing SecTemplates.com and the incident response program pack 1.0

    In addition to CGISecurity I work on other side projects from time to time. Below is an announcement about my latest project. IntroductionI’ve worked in the security industry for over 20 years and, during this time, have built and shaped many security programs. At every company I join, I find myself recreating or developing security…

    Read more of this story…

  • 20 years of CGISecurity: What appsec looked like in the year 2000

    Just realized that 20 years have passed since I started this site to learn more about web security threats.   What 'appsec' looked like in 2000 OWASP didn't exist yet, nor did WASC Vulnerability disclosure was the wild west.  Rain forest puppy (RFP) (that guy who discovered sqli) had just created the first attempt at…

    Read more of this story…

  • Red and Blue team postmortems

    If you haven't run a joint exercise with red/blue, you can setup time to perform a postmortem of what happened during a previous red team engagement.   Walk step by step over the engagement, and review the steps performed (kill chain)  For each step ensure you can answer the following If you can't answer the…

    Read more of this story…

  • My experience coleading purple team

    I've been fortunate enough to manage a red team program for several years and since it's inception it has gone through many changes. What started out as adhoc engagements trying to see how far we could get/what problems we could find, turned into a mechanism to work more closely, and regularly with operations/it teams. More…

    Read more of this story…

  • Joint blue team and red team exercises

    Having regular (probably monthly for most) red team engagements where the red teamers and incident response/monitoring teams sit in a room while the engagement occurs is a must. Everytime the red teamer executes a command that advances them, blue should be asked: If they detected it If not, could they have detected it? If unsure,…

    Read more of this story…

  • oAuth nightmares talk

    Two of my co workers have presented at HackMiami on flaws people implement in their oauth implementations. The talk summary is below "OAuth is one of the most popular authorization frameworks in use today. All major platforms such as Google, Facebook, Box etc support it and you are probably thinking of implementing OAuth for your…

    Read more of this story…

  • Extensive IOS hacking guide released by Security Innovation

    Security Innovation has published a very extensive guide to IOS hacking that's worth checking out. Here's the table of contents 1. Setting Up iOS Pentest Lab……………… 51.1 Get an iOS Device……………….5 1.2 Jailbreaking an iOS Device……………… 7 1.3 Installing Required Software and Utilities ……………… 102. Acquiring iOS Binaries……………… 133. Generating iOS Binary (.IPA file) from…

    Read more of this story…

  • Presentation: Problems you’ll face when building a software security program

    A video for a talk I gave at LASCON last year made it online that some folks may find interesting. I rarely give public talks, but felt this information would have been useful to learn earlier in my career. Basically it goes through problems I've had to deal with building out appsec programs at companies…

    Read more of this story…

  • Google’s intentions are good, but implementation leave MORE users vulnerable to hacking than before

    In 2010 I wrote an article about a flaw Google discovered, and published working exploit code when no fix or mitigation existed. This allowed attackers to immediately start using the flaw to hack Google's own users (in this case, the world).  Since then Google has announced a new program 'Project Zero' which from the project…

    Read more of this story…

  • My experience with developer security training

    I've been busy this past year which has resulted in almost no updates to this site. Consider this one of many rants/posts of my experience/s in the industry during this time.  This post covers a topic I think many people implement poorly, which is security training targeting developers.   How most people implement developer focused…

    Read more of this story…

  • A reminder that what you say at events may show up in unexpected places (like the news)

    Last week I was fortunate enough to be invited to a Yahoo event discussing bug bounty programs where all the organizers of these bounties were discussing their experiences. I attended this conference because years earlier I was involved in creating PayPal's bug bounty program and wanted to ask a panel of people currently running a…

    Read more of this story…

  • Malicious CA’s continue to cause headaches

    Google published today that yet another CA has been caught generating certs for Google's domains. This problem is likely occuring on a much larger scale and seems to be detected by chance. Some have suggested crawling the internet and starting a DB, and while this may detect some issues it's limited for the following reasons…

    Read more of this story…

  • WASC Announcement: Static Analysis Technologies Evaluation Criteria Published

    The Web Application Security Consortium (WASC) is pleased to announce the Static Analysis Technologies Evaluation Criteria. The goal of the SATEC project is to create a vendor-neutral set of criteria to help guide application security professionals during the process of acquiring a static code analysis technology that is intended to be used during source-code driven…

    Read more of this story…

  • Jacking out of the metaverse: Retaliating to cyberwar in the real world

    I've been chatting with some folks in infosec about the escalation of 'cyber attacks' sponsored by governments which target other governments, and private corporations. There's uneasyness in the security industry about possible overeactions and restrictions of freedom as a result of this growing concern. This entry will attempt to break down some of these concerns,…

    Read more of this story…

  • Poll: How do you rank the importance of a vulnerability?

    I've added a new poll to the WASC linkedin group that a few of you may be interested in. Specifically asking how people rank the importance of vulnerabilities. Poll Linkhttp://www.linkedin.com/groups/How-do-you-rank-importance-83336.S.202840840

    Read more of this story…

  • Five pieces of advice for those new to the infosec industry

    I've worked in the security field in various roles (script kiddie, security researcher, incident response, application security engineer, security consultant, strategy, etc..) and thought I'd share a few points to those of you starting out in the security industry.   Things are worse than you expect The reality is that companies, even large ones, are…

    Read more of this story…

  • Security Industry Plagiarism: Finding 3 examples in 5 minutes with Google

    UPDATE: One of the authors has posted two responses including an apology (accepted). I was taught in grade school that if you plan on writing something, never plagiarize. If you want to republish portions of existing content ensure you properly quote/reference them, and never represent this content as your own original work. Unfortunately it seems…

    Read more of this story…

  • Updating the WASC Threat Classification

    I've been pretty busy the past few months which has resulted in zero site updates. The good news is I've kicked off the next phase of the WASC Threat Classification and our first update is the completion of the TC's missing crypto section.

    Read more of this story…

  • Quick defcon/blackhat preparation list

      A couple of people had asked me what are some things that you can do prior to attending hacker cons such as Blackhat and Defcon. Kurt Cobain said it best "Just because you're paranoid, doesn't mean they're not after you'. Here's a short list (albeit not complete as I don't plan to publish all…

    Read more of this story…

  • Summary of Google+ browser security protections

    Ray "Vanhalen" Kelly has written a post describing the security mechanisms used by Google+, as well as compares them to facebook. In particular he reviews each HTTP protection header and provides a good explanation of the purpose of each protection. Link: https://www.barracudanetworks.com/blogs/labsblog?bid=1743

    Read more of this story…

  • Paper: Web Application finger printing Methods/Techniques and Prevention

    Anant Shrivastava has posted a whitepaper providing a rundown of application fingerprinting methodologies, as well as comparisons of various tools such as W3af, BlindElephant, and Wapplyzer. "This Paper discusses about a relatively nascent field of Web Applicationfinger printing, how automated web application fingerprinting is performedin the current scenarios, what are the visible shortcomings in the…

    Read more of this story…

  • Oracle website vulnerable to SQL Injection

    Someone has published a SQL Injection in labs.oracle.com at http://www.thehackernews.com/2011/07/oracle-website-vulnerable-to-sql.html . That is all.  

    Read more of this story…

  • WASC Announcement: ‘Static Analysis Tool Evaluation Criteria’ Call For Participants

    I sent the following out to The Web Security Mailing List (which I moderate) announcing a new WASC Project. "The Web Application Security Consortium is pleased to announce a new project "Static Analysis Tool Evaluation Criteria (SATEC)".  Currently WASC is seeking volunteers from various sections of the community including security researchers, academics, vendors, software developers…

    Read more of this story…

  • Results of internet SSL usage published by SSL Labs

    Ivan Ristic (of modsecurity fame) has published the results of an evaluation against over 900,000 websites supporting SSL. The goal of this evaluation was to see how people really use/misuse ssl in the wild, as well as report on the usage of browser protections such as the Secure cookie flag, and Strict-Transport-Security. Details can be…

    Read more of this story…

  • Another use of Clickjacking, Cookiejacking!

    Rosario Valotta has published an interesting attack against IE that takes advantage of clickjacking. In a nutshell it combines origin flaws within IE with clickjacking to trick a user into copying/pasting their own cookies from any site! Demonstration below The technical details can be found at https://sites.google.com/site/tentacoloviola/cookiejacking and his slides at https://docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnx0ZW50YWNvbG92aW9sYXxneDoxMWJlZTI5ZjVhYjdiODQx  

    Read more of this story…