Application security

Under the Hood: Reversing Android Applications

For several years now, there has been an explosive increase in the use of mobile applications. Included in this staggering increase of mobile software are ap

A Few Words on Malware - The Sality Way

Malware comes in different sizes and shapes. Trojans, worms, viruses, downloaders, and others are becoming more common than common cold medicine. These malwa

Inserting Vulnerabilities in Web Applications

In this article we will look at how we can insert vulnerabilities in web applications. Why? There are basically two reasons. [pkadzone zone="main_top"] [pka

Cross-Site Scripting (XSS)

Web applications today suffer from a variety of vulnerabilities. Cross-Site Scripting (XSS) is one of the most prevalent web application security flaws, yet

Fuzzing – Application and File Fuzzing

In our first article, we reviewed the basics of fuzzing as well as the mutation and generation technique. We have also introduced the PeachFuzzer, which we w

Secure random number generation in JAVA

“Random numbers” means numbers which are random in practice (i.e. unpredictable and non – reproducible). As simple this term looks when you hear it for the f

SQL Injection: The Equal Opportunity Vulnerability

Introduction In the first installment of this series, we discussed application security within the Software Development Process by demystifying the adoption

HTTP response splitting attack

In this paper we will discuss HTTP Response Splitting and how the attack can actually be carried out. When we're clear about how it works, because it is an o

Attacking web services Pt 2 - SOAP

In the previous article, we discussed forming a SOAP request based off the operations listed in a WSDL file and automating this task with Buby and Burp Suite

Attacking web services Pt 1 - SOAP

I often receive testing related questions from AppSec folks new to web services about the techniques used to discover and attack them. Often, web services ar