Introducing: Encoding Tools
If you are a programmer, pen tester, or reverse engineer, you probably find
yourself needing to manipulate data between various representations, such as URL
encoding, base64 encoding, etc. There are a lot of web sites and utilities to do
this sort of thing interactively, but I've never been totally satisfied with any
So… I built my own! Today I am releasing Encoding Tools, an open source, browser-based utility for
transforming text and binary strings.
Cracking A "Signed" Cookie
During some downtime for the holidays, I have been looking into some public bug
bounty programs. One of these programs brought me across an interesting SQLi
vulnerability: a value is obtained from a cookie and used in a dynamic SQL
query without sanitizing. This would be trivial to exploit but for one thing:
the contents of the cookie are protected from tampering by a simple "signature".
This post explores whether the signature can be cracked with John The Ripper.
Evil Maid vs. Linux FDE
I have been using Full Disk Encryption (FDE) on all my devices for about 5 years
now. In the first few years, I had learned that FDE was a robust defense against
physical access. Then one day I stumbled across Evil Maid, a threat model
where an adversary has physical access for only a brief time. This threat model
has deep implications for FDE and physical security in general, but it is
relatively obscure: it doesn't even have a Wikipedia page! In this post, I
develop a very simple Evil Maid proof-of-concept (POC) against the default FDE
configuration in Lubuntu 16.04.
The most popular posts on my blog have been my harsh reviews of the CISSP and CEH
certifications. You might just think that I don't like certifications in
general, and I probably would have agreed with you before I signed up for
PWK/OSCP. Today, I'm going to tell you about my experience working through this
unusual infosec certification.
Debugging A Memory Leak In Python
I recently ran into a memory issue with Python: a long-running script would use
more and more memory until the kernel would eventually kill it. Python doesn't
have "memory leaks" in the same sense that lower level languages do, but it is
possible to tie up memory by maintaining a reference to it somewhere that you
forgot about. As it turns out, there are some awesome tools for troubleshooting
this kind of bug in Python.
Reflected XSS In DesignCrowd.com
In July 2014, I found an obvious reflected XSS vulnerability in DesignCrowd. In the interest of responsible disclosure, I
submitted a report to the company at that time, and I can't remember if I ever
heard back. This draft post has been collecting dust ever since, so I'm finally
publishing it today.
Cracking JXcore… Again
In a previous article, I investigated the
security claims of a product called JXcore. That has turned out to be one of the
most popular (of the relatively few) articles on my blog. Not long after I
posted it, I was informed that JXcore had fixed the security flaws that I
pointed out. Taking them at their word, I updated that article with a note about
this claim, but I never actually investigated the claim to see if it is true.
Recently, a co-worker was trying to figure out how to protect a node.js project
from reverse engineering and modification. Of course, programmers have spent
decades trying to figure out ways to allow an end user to run a program without
letting the end user reverse engineer or modify the program, and I've never
heard of anybody successfully doing it. At best, the program is still insecure
and the developers have only managed to piss off their high-paying customers.
So naturally, my skepti-larm was blaring when my coworker sent me the link for
I like trying to describe technical concepts to non-technical people. Everybody
deserves (and needs!) a basic understanding of the things they use and rely on
every day. One of the most important things you use online is your password – or
hopefully many different passwords.
About a year ago, I posted my thoughts on the
CISSP certification. I recently took the CEH certification, and so I'm taking a
few minutes to reflect on this certification as well.