Verizon Data Breach Report 2015

A high level summary of the main findings from the cyber security industry’s favourite data driven report. As usual, the report is an easy read packed with analysis and information that is appetising and relevant. The key concerns centre on the age old favourite threat scenarios of patch management and phishing attacks. An attempt to […]

QNAP NAS – Remote Unauthenticated User To Admin Shell: Part 1

tl;dr A number of security vulnerabilities have been identified in two applications hosted on the QNAP App Centre. When combined, it is possible for a remote unauthenticated user to gain interactive remote administrative access and take full control of the device. Introduction As a security professional you are constantly sharpening your skills; investigating a new […]

Network Security Monitoring With Bro IDS, TCPDump And MongoDB

Bro IDS is a powerful open source network security monitoring framework which I have had the opportunity to experiment with on a network monitoring server. It can log metadata for well known protocols such as HTTP, DNS and SMTP, as well as extract files it sees being transferred in these protocols. It logs all its […]

CSRF And Unsafe Arbitrary File Upload In NextGEN Gallery Plugin ( For WordPress

1      Introduction Please note the vulnerability detailed in this blog article was first discovered on Monday 9th March 2015, disclosed and discussed with the company concerned on March 10th and a patch was released on March 12th. 1.1    Versions and CVE Currently tested on NextGEN Gallery >= and WordPress 4.1.1 CVE-2015-1784 NextGEN Gallery WordPress: file […]

Windows Inline Function Hooking

Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function calls that a malicious program is making. It can also be used by a malicious program to hide certain aspects of itself.  For example, malware might try and install a hook into Windows API functions, which list […]

Vulnerability Discovery Via 'Fuzzing'

Why would you fuzz? People fuzz for many reasons, depending on the industry they are in, from reliable assurance through to testing and validation. In security research, our primary goal is to discover potential vulnerabilities or weaknesses. Fuzzing allows us do this in an automated, if not somewhat less rigorous, manner. This is the first […]