web security

Detect malicious HTML/JavaScript payloads with WebInspect (e.g. ASPROX, Gumblar, Income Iframe)

Detect malicious HTML/JavaScript payloads with WebInspect (e.g. ASPROX, Gumblar, Income Iframe)

JDS Australia has developed a set of Custom Checks for WebInspect that aim to detect malicious HTML/JavaScript related to automated attacks being carried out across the Internet that infect Web Applications. These malicious payloads connect to domains under the control of the attacker that deliver attacks against known vulnerabilities in commonly installed applications (e.g. Adobe Acrobat Reader and Adobe Flash, in the case of the Gumblar/Matruz payloads).

Read More

Posted by JDS Admin in Tech Tips
Harvesting file names with VuGen

Harvesting file names with VuGen

VuGen isn't just a tool for load testing and application monitoring, it can be used to automate any repetitive task on a web application.

In this example, a JDS web security expert had found that a page on a content-managed website allowed anyone to request any file in the database (http://www.example.com/FileViewer/getFile.do?id=1449 ).

It was easy to create a simple VuGen script to compile a list of all the files in the database.

Read More

Posted by JDS Admin in Tech Tips