-
Insight into debugging x64 code. Might come in handy.
Author: Tim's Bookmarks
Grab bag: Wacky programming tricks
-
I think they forgot to open up the blog post with “Cross-site scripting, I’ma let you finish, but …” Seriously, the Veracode State of Software Security report found that XSS was more prevalent in web applications by a wide margin, both in terms of raw flaw count and applications affected by one or more instances of the flaw.
-
Programming an Apple //e through the audio interface by playing the original cassette tape back through the iPad audio interface. Wow.
-
Open source tool to audit compiled software. Rather than doing full on data and control flow modeling, it looks to see if object code resulted from the compilation of specified source code. Could be a good competitor for BlackDuck.
Super powered breadcrumbs
-
Nice approach to combining navigation and “where am I” in UI design.
Grab bag: some history and geography of appsec
-
Interesting article about the evolution of the buffer overflow market. The Wintel platform’s (x86 + Windows) attractiveness to developers appears to have not done it any favors when it came to the evolution of buffer overflow exploits.
-
Interesting findings about relative platform security. This sort of report is always subject to sampling biases but some of the findings (the relative insecurity of Perl, ColdFusion, plain-vanilla JSP, and PHP websites) ring true.
Grab bag: conjoint, convicted coder
-
Nice introduction to one of the more conceptually rigorous concepts in product design.
-
The long, strange journey of Stephen Watt.
Information asymmetry
-
Pandora’s briefcase, or an extended argument on the perils of information asymmetry. Good WWII spycraft read from Gladwell.
Ransom note exploits
-
Even in OSes with fully randomized address spaces and data execution protection, you can use return oriented programming to patch together malicious code from sequences of instructions that are in memory from common executables (“ransom note exploits”). The lesson: shift the game from focusing on injection vulnerabilities to minimizing the damage an attacker can cause. One of the best papers from SOURCE: Boston in 2010.
DRM free video downloads
-
Hmm. Might be worth checking out just on the basis of the titles that are there (“M”, “The 39 Steps”…)
Grab bag: SharePoint zero day
-
SharePoint Server 2007 has a cross site scripting vulnerability in the Help subsystem which is exploitable on any SharePoint 2007 site.
-
Awesome project: an online archive of the evolution of typography, starting with the incunabula.
Grab bag: Secrets and security
-
Putting the “crypt” in “crypto-Catholic.”
-
A collaborative and informal way to develop “misuse cases” and perform threat modeling.
-
How to think like a hacker–including leveraging social networking to get into your target.
Neverending loop
-
Interesting argument from Dave–big tech companies fail because they try to do all their innovation internally, and eventually they run out of brilliant folks to hire and end up with the “general talent pool.”
Google’s password system was targeted
-
Yet more evidence that perimeter defense systems are flawed. If you can’t secure applications at all layers of the stack, including the end user, you can’t secure your organization.
Grab bag: Monkeybagels!
-
This isn’t a bad description of my job, and my teams’ jobs, on a release to release basis.
-
Makes me wonder what the Boston papers are doing with their comments sections, if Rosenberg’s suggestion is on. Is anyone watching the store?
Apwnche
-
Significant XSS attack against Apache used to steal passwords from admins and contributors, and to root internal work projects. XSS is not a trivial defacement attack when it can be used to compromise something viewable by an administrator and steal their session cookie.
Zero day, yo
-
And I quote, “Man, cousin, I'm about to put in the work,/assert authority. Administrative access: crack this./If your patches back in the past, this/0day gets you on a root trip. True crypt./Key file, I will keystyle shell code,/triple sevens all up on the ch mod.” Wack.