Sunday, March 08, 2009
Tweet Tweet!
Wednesday, February 04, 2009
Frustrated by a coworker’s use of old-school programming techniques
Monday, February 02, 2009
Academic Earth
Thursday, January 15, 2009
TODO: Check out XSS Proxy
Thursday, May 29, 2008
Cool hack: Man exploits random deposit verification flows to steal $50,000
Link: http://www.cgisecurity.com/2008/05/12
Tuesday, May 27, 2008
Suggestive

For your info, the word obviate means to do away with something (unnecessary).
Thursday, May 15, 2008
Wednesday, May 14, 2008
Click Crime
http://www.securityfocus.com/columnists/471
Mark Rasch gives a very good description on "criminal honeypots" some of it's possible implications worldwide if implemented on a larger scale. The difference between setting up a trap and entrapment is talked about here also.
From the web application security perspective, it would be possible to frame someone else not only by using social engineering, but also even attacks like this:
- Create javascript code in a site that you control that exploits CSRF weaknesses in the criminal honeypot. Wait for the target to access your site and "click" the link automatically.
- Create a site that's linked to your target somehow, and get many many people to click on the link (to the criminal honeypot) that you put in the site. The FBI sees the referrals from that site, and traces it to your victim.
Wednesday, April 16, 2008
Google XSS
Netcraft has a shorter version of the details also. Quoted below:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
An interesting cross-site scripting (XSS) vulnerability found in the Google Spreadsheets service would have allowed attackers to gain unauthorised access to other Google services, including Gmail and Google Docs.
The vulnerability was discovered by security engineer Billy Rios, and takes advantage of nuances in the way Internet Explorer handles Content-Types for webpages.
When a spreadsheet is saved and downloaded in CSV format, the Content-Type is set to "text/plain", thereby instructing the client's browser that the document should be treated as plain text. However, if HTML tags are entered into the first cell of the spreadsheet, Internet Explorer detects these tags near the start of the CSV document and instead deduces that it should be treated as HTML. This essentially allowed arbitrary HTML webpages to be served from spreadsheets.google.com, which in turn allowed JavaScript to be executed in the context of the spreadsheets.google.com site. A remote attacker could exploit this weakness by stealing the user's session cookies and hijacking their session.
Rios points out that Google cookies are valid for all google.com sub domains. This means that when a user logs in to Gmail, the Gmail cookie is also valid for other Google services, such as Google Code, Google Docs, Google Spreadsheets, and more. Cross-site scripting vulnerabilities in any of these sub domains can allow an attacker to hijack a user's session and access other Google services as if they were that user.
Google has fixed the vulnerability discovered by Rios and there have been no reports of the vulnerability being exploited by attackers.
