2139 links
238 private links
  • Ginko's Link Dump
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
◄Older
page 77 / 96
Newer►
  • Wayback Save
    April 8, 2014 at 6:22:58 PM GMT+2 - permalink -
    QRCode
    - archive.org - javascript:void(location.href='http://web.archive.org/save/'+document.location.href)
    bookmarklet
  • Wayback
    April 8, 2014 at 6:22:37 PM GMT+2 - permalink -
    QRCode
    - archive.org - javascript:void(location.href='http://web.archive.org/web/*/'+document.location.href)
    bookmarklet
  • Show anchors
    April 8, 2014 at 5:33:41 PM GMT+2 - permalink -
    QRCode
    - archive.org - javascript:(function(){/*%20v2.2%20--%20http://bit.ly/7akCur%20*/function%20ls(u,c){var%20h=document.getElementsByTagName("head")[0];var%20s=document.createElement("script");s.src=u;var%20d=false;s.onload=s.onreadystatechange=function(){if(!d&&(!this.readyState||this.readyState=="loaded"||this.readyState=="complete")){d=true;c();s.onload=s.onreadystatechange=null;h.removeChild(s);}};h.appendChild(s);}var%20$;var%20loc=location.href;var%20anchorPos=location.href.lastIndexOf('#');if(anchorPos>-1){loc=loc.substring(0,anchorPos);/*%20if%20already%20has%20an%20anchor,%20it%20needs%20to%20be%20replaced%20*/}function%20a(e,n,t){$('<a%20href="'+loc+'#'+n+'"%20title="'+t+':%20'+n+'"><img%20src="data:image/png;base64,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%3D%3D"%20/></a>').insertBefore(e);}ls("http://ajax.googleapis.com/ajax/libs/jquery/1.3/jquery.min.js",function(){$=jQuery;$("a[name]").each(function(i){a(this,this.name,"NAME");});$("[id]:not(input[type='hidden'])").each(function(i){a(this,this.id,"ID");});});})()
    bookmarklet
  • Help:Using the Wayback Machine - Wikipedia, the free encyclopedia
    April 8, 2014 at 4:44:41 PM GMT+2 - permalink -
    QRCode
    - archive.org - https://en.wikipedia.org/wiki/Wikipedia:Using_the_Wayback_Machine#JavaScript_bookmarklet
    archive
  • A Beginner's Guide to HTTP Cache Headers | Mobify
    April 8, 2014 at 4:38:45 PM GMT+2 - permalink -
    QRCode
    - archive.org - http://www.mobify.com/blog/beginners-guide-to-http-cache-headers/
  • ShareDrop

    dukto en webapp

    April 4, 2014 at 4:08:15 PM GMT+2 - permalink -
    QRCode
    - archive.org - https://www.sharedrop.io/
    p2p
  • Captvty

    replay non-libre (gratuit)

    April 2, 2014 at 10:47:20 PM GMT+2 - permalink -
    QRCode
    - archive.org - http://captvty.fr/
    tv tool
  • Les Chroniques d'un monde de merde
    April 2, 2014 at 10:45:14 PM GMT+2 - permalink -
    QRCode
    - archive.org - http://www.leschroniquesdunmondedemerde.com/
    webserie dystopie
  • Sardine | Le Geektionnerd
    March 30, 2014 at 10:12:31 PM GMT+2 - permalink -
    QRCode
    - archive.org - http://geektionnerd.net/sardine/
    own
  • Bypassing web application firewalls using HTTP hea... - HP Enterprise Business Community

    Bypassing web application firewalls using HTTP headers
    jhaddix| March 19, 2014 - last edited March 20, 2014
    1 Comments
    1

    2014-03-19_12-47-41.png

    Web application firewalls (WAF’s) are part of the defense in depth model for web applications. While not a substitute for secure code, they offer great options for filtering malicious input. Below is a story from a real assessment where an enterprise deployment of such a device was vulnerable to being bypassed. The vulnerability is one of a bad design and/or configuration and as an attacker it was very useful. Read below to find out more!


    Testing the security of an app in its production deployment is important. While this app might have been assessed in development or QA, when you deploy live you might introduce new attack vectors due to configuration issues. Such was the case with our fictional customer Heisenberg Bank.

    While firing up the assessment I quickly ran into issues fuzzing all the application points I usually go after first, see below (screenshot approximated):

    teapot.png

    Well… that’s both humorous and unsatisfying.

    After a bit of investigating I knew that I was up against a WAF that was triggering on a few things:

    Rapid succession of POST request to forms
    Rapid succession of GET requests to *most* pages
    Lack of a CSRF token
    *Bad* characters

    After one of these conditions were met it would block me with said error code for 5 minutes.

    So, how to proceed?

    The normal method of encoding payloads to bypass WAF regexes is hit or miss these days. WAF’s have come a long ways. Still, I gave it a shot, no dice.

    While waiting in one of my timeouts I decided to do some WAF research. While going through several WAF implementation guides I found a forum that mentioned integrating a WAF with your caching service/device. It described a user’s trouble with standing up something like Varnish or a proxy/accelerator appliance running on a different host, and that the WAF was blocking that server. Of course the vendor promptly replied that you can whitelist devices based on IP, allowing them not be inspected by the WAF.

    At this point, everything is still fine. Below is where things went bad for Heisenberg Bank and the WAF.

    After reading more, I found that instead of doing a real lookup on incoming requests (something akin to REMOTE_ADDR or something similar), the WAF was looking at a custom HTTP header.

    This is how it’s supposed to work if a user or other server contacts the WAF:

    supposed.png

    Instead, the WAF checks the requests HTTP Headers. The specific implementation was checking the request for the header X-originating-IP.

    So, who would this WAF be configured to trust? In this instance the default was… Itself!

    Since I control all HTTP requests sent out of my browser I can easily add this header fooling the WAF to think I was itself, allowing me to bypass its protections completely:

    wafreq.png

    After further research there are several headers that can be defined for WAF’s to whitelist (instead of doing a proper lookup):

    X-forwarded-for
    X-remote-IP
    X-originating-IP
    x-remote-addr

    There is also a hit-list of types of addresses/configurations that might be whitelisted/vulnerable. (some fictitious examples below):

    headers.png

    After figuring out the bypass, the rest of the assessment yielded many other vulnerabilities and was expedited due to the fact that I could bypass the WAF. It was as simple as having my inline interception proxy add the header to all requests.

    A simple solution is having your frontend proxy strip all non-standard headers but then you’re still playing the cat and mouse game of blacklisting. Better yet, consult with your WAF vendor and see what headers are accepted and defaults are enabled. Then find a solution that doesn’t rely on information that the attacker can forge.

    In general you can also audit the security of HTTP headers on your site using Gethead, a project from our dynamic testing team’s leader, Nathan LaFollette (@httphacker).

    As always, feel free to reach out with any questions via Twitter (@jhaddix) or via email (jason.haddix@hp.com).

    Happy hacking!

    March 22, 2014 at 11:39:03 PM GMT+1 - permalink -
    QRCode
    - archive.org - http://h30499.www3.hp.com/t5/Fortify-Application-Security/Bypassing-web-application-firewalls-using-HTTP-headers/ba-p/6418366
  • Extraire des données structurées à partir d’un PDF
    March 21, 2014 at 10:45:04 AM GMT+1 - permalink -
    QRCode
    - archive.org - http://korben.info/extraire-des-donnees-structurees-partir-dun-pdf.html
    tool opensource parsing extraction
  • 2048

    Tetris

    March 20, 2014 at 10:57:36 PM GMT+1 - permalink -
    QRCode
    - archive.org - http://gabrielecirulli.github.io/2048/
    game
  • Calculer les kwh de consommation à partir d'un DPE - Rentables.fr
    March 18, 2014 at 9:56:39 PM GMT+1 - permalink -
    QRCode
    - archive.org - http://www.rentables.fr/depenser-moins/economie-energie/calculer-les-kwh-de-consommation-a-partir-dun-dpe/
  • Prix kWh
    March 18, 2014 at 9:48:16 PM GMT+1 - permalink -
    QRCode
    - archive.org - http://prixkwh.com/
  • Email storm - Wikipedia, the free encyclopedia
    March 18, 2014 at 11:53:15 AM GMT+1 - permalink -
    QRCode
    - archive.org - http://en.wikipedia.org/wiki/Email_storm
  • Google DDoS
    March 17, 2014 at 3:18:47 PM GMT+1 - permalink -
    QRCode
    - archive.org - http://korben.info/google-ddos.html
    crack
  • Importer un PST dans Thunderbird pour Linux
    March 17, 2014 at 3:16:11 PM GMT+1 - permalink -
    QRCode
    - archive.org - http://korben.info/importer-pst-dans-thunderbird-pour-linux.html
  • Ddrescue - GNU Project - Free Software Foundation (FSF)

    Récupération réparation disque dur

    March 17, 2014 at 3:10:27 PM GMT+1 - permalink -
    QRCode
    - archive.org - https://www.gnu.org/software/ddrescue/ddrescue.html
    tool opensource
  • Iconiom – Un générateur d’icones sympas
    March 17, 2014 at 3:07:34 PM GMT+1 - permalink -
    QRCode
    - archive.org - http://korben.info/iconiom-generateur-dicones-sympas.html
  • Sortie de Reqflow pour tracer vos exigences - LinuxFr.org
    March 11, 2014 at 10:55:05 AM GMT+1 - permalink -
    QRCode
    - archive.org - http://linuxfr.org/news/sortie-de-reqflow-pour-tracer-vos-exigences
    outil gestion_de_projet
Links per page: 20 50 100
◄Older
page 77 / 96
Newer►
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation