Benjamin Daniel Mussler, Senior Security Researcher at Acunetix meets with Paul at Paul’s Security Weekly to discuss how Acunetix handles authentication to broaden the scan surface and why a web vulnerability scanner should be able to log into protected areas.
Acunetix Web Application Vulnerability Report 2019
Acunetix compiles an annual web application vulnerability report. The purpose of this report is to provide security experts and interested parties with an analysis of data on vulnerabilities gathered over the previous year. The 2019 report contains the results and analysis of vulnerabilities, detected from…
A fresh look on reverse proxy related attacks
In recent years, several researches have been published about attacks deliberately or directly related to reverse proxies. While implementing various reverse-proxy checks on the scanner, I started analyzing implementations of reverse proxies. Initially, I wanted to analyze how both reverse proxies and web servers parse…
Application Security Weekly: Reverse Proxies Using Weblogic, Tomcat, and Nginx
Aleksei Tiurin, Senior Security Researcher for Acunetix joins Paul’s Application Security Weekly show, for a technical segment on reverse proxies using weblogic, Tomcat, and Nginx.
How to Stop Old, Backup and Unreferenced Files from Leaking Sensitive Information
The very real threat of information disclosure by means of inadvertent exposure of sensitive files has been a constant source of woe for corporations and individuals alike. Despite having the potential for serious repercussions including legal ones, many webmasters, administrators and developers have struggled to…
How to Verify a Cross-site Scripting Vulnerability
Analyzing web application vulnerabilities discovered by an automated scanner such as Acunetix often requires us to investigate further. This is in order to: Verify the vulnerability exists in the context of the application. Adjust the vulnerability payload reported by the scanner to something more invasive…
Why Scoping Cookies to Parent Domains is a Bad Idea
When dealing with Web Application vulnerability assessments, it is very common to come across scenarios where for various reasons (business or otherwise) users decide to focus entirely on Medium or High severity vulnerabilities such as SQL Injection and XML External Entity Injection. As a result,…
What is Web Cache Poisoning?
How does Caching work? All forms of Caching in computer science, whether it be CPU cache, HTTP Web Server cache, Database cache and so on, aims to speed up response times for whatever is requested. Doing so helps reduce load as much as possible on…
Paul’s Security weekly Episode: Insecure Deserialization in Java/ JVM
Aleksei Tiurin, Senior Security Researcher at Acunetix, joins Paul’s Security Weekly to talk us through “Insecure Deserialization in JAVA/JVM”! After initial extensive research in 2015, Insecure Deserialization has been a very hot topic in the Java-world. More and more deserialization vulnerabilities are found again and…