Security Suits, Ties, and Lies

Literary Antidotes for Today's Security Snake Oil

Frida Engage Part Three | You Down With XPC?

28 March 2018

Overview In the final installment of the Frida Engage blog series, we will demonstrate how to use Frida for hooking and inspecting Apple's NSXPC API using the CleanMyMac 3 application as our guinea pig. NSXPC XPC is one flavor of the Inter-Process Communication technologies provided by Apple. "The XPC Services API, part of libSystem, provides a lightweight mechanism for basic interprocess communication integrated with Grand Central Dispatch (GCD) and launchd. The XPC Services API allows you to create lightweight helper…

Read more

arrow right
avatart

posted by Benjamin Watson

Tags:

Oh the POSsibilities – A Case Study in Point-Of-Sale Insecurity

26 March 2018

Introduction The use of Point-Of-Sale systems can be seen in industries such as retail, hospitality, food service, apparel, grocery, automotive, etc. Any time you swipe a card to make a purchase or utilize a self-checkout kiosk, a Point-Of-Sale system is responsible for handling the intricacies of your transaction in the background. Given the delicate nature of Point-of-Sale, security standards have been created to protect consumers from malicious actors. The Payment Card Industry Data Security Standard (PCI-DSS) is an information security…

Read more

arrow right
avatart

posted by rabid

XML EXTERNAL ENTITY (XXE) PROCESSING

22 February 2018

If you've taken a look at the 2017 OWASP Top 10, updated for the first time since 2013, you might be wondering what in the world XML External Entity (XXE) processing is and how it pulled the number four spot of most critical web application security risks. Also, according to OWASP it’s an issue that is "not commonly tested as of 2017." Don't panic – here's a quick rundown of what it is and why you should care. What is…

Read more

arrow right
avatart

posted by Zach Varnell

IT’S TAX SEASON, SAFEGUARD YOUR ORGANIZATION’S W-2S

5 February 2018

It’s tax season in the United States and many organizations have just prepared their employee's W-2s. You may have recently received the form in an electronic or paper format and are prepared for the opening day of tax filing on January 29th. Tax season also provides an opportunity for cyber criminals to attack your organization with a social engineering technique commonly referred to as phishing. Criminals are interested in collecting W-2s as the information on the form enables them to…

Read more

arrow right
avatart

posted by Ray Strubinger

EXPLOITING VYPRVPN FOR MACOS

24 January 2018

Overview In 2017, VerSprite released an advisory for a privilege escalation vulnerabiliy in the VyprVPN macOS application. In this blog post, we'll dive into the process of finding this vulnerability and writing a simple exploit for it. Auditing When performing attack surface enumeration for any macOS application, I typically search for XPC (Cross Process Communication) API usage. I've found that rarely do I see XPC services in third-party applications being secured, so it tends to always be a focal point for my bug hunting…

Read more

arrow right
avatart

posted by Benjamin Watson

EXPLOITING THE DOLPHIN BROWSER FOR ANDROID’S BACKUP & RESTORE FEATURE

14 December 2017

Overview On December 11, 2017 VerSprite published the following advisory for the Dolphin Browser.   Advisory [VS-2017-001] Dolphin Browser for Android Backup & Restore Arbitrary File Write Vulnerability CVE ID CVE-2017-17551 Vendor Mobotap Product Dolphin Browser for Android < 12.0.2 Vulnerability Details The Backup and Restore feature in Mobotap's Dolphin Browser for Android 12.0.2, suffers from an arbitrary file write vulnerability when attempting to restore browser settings from a malicious Dolphin Browser backup file. This arbitrary file write vulnerability, allows an…

Read more

arrow right
avatart

posted by Benjamin Watson

Let us build a tailored engagement for you.

We are an international squad of professionals working as one.

logos