Welcome to SecurityDocs

A collection of 7,860 IT security white papers, carefully curated by professionals like yourself

An Overview of Wordpress and its Security Plugins

by Mahwish Khan

Since Word Press is Open Source Platform, the Security features that come with it are also Open Source based. The primary advantages to this are that these plugins are constantly evolving, and you can pick out the ones that you think will best protect your website, blog site, or even your online store. There are many of these kinds of plugins that are out there, which is evident by doing a Google search. If you are new to Word Press are not exactly sure of what to use, you can always reach...

Nov. 14, 2017 0 comments resources.infosecinstitute.com Apps & Hardening

Hack the dina VM (CTF Challenge)

Hello friends! Today we are going to take another CTF challenge known as dina. The credit for making this vm machine goes to “Touhid Shaikh” and it is another boot2root challenge where we have to root the server to complete the challenge. You can download this VM here. Let’s Breach!!! Let us start form getting to know …

Nov. 14, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Implementing Public Key Infrastructure Using Microsoft Windows Certificate Services

by Michael Naish

Public Key Infrastructure (PKI) is a critical application that provides confidentiality and integrity to the Enterprise and its Customers. Microsoft Windows Server 2012 Certificate Services is a capable solution that creates a high assurance PKI, but there are many design decisions to make before implementation. By understanding prerequisites and configuration options, an organization can quickly develop a strategy to construct a PKI that meets its assurance needs. A clear strategy will short...

Nov. 14, 2017 0 comments 29 minute read Apps & Hardening

SQL Injection in bbPress

by Marc-Alexandre Montpas

During regular audits of our Sucuri Firewall (WAF), one of our researchers at the time, Slavco Mihajloski, discovered an SQL Injection vulnerability affecting bbPress. If the proper conditions are met, this vulnerability is very easy to abuse by any visitors on the victim’s website. Because details about this vulnerability have been made public today on a Hackerone report, and updating to the latest version of WordPress fixes the root cause of the problem, we chose to disclose this bug and...

Nov. 14, 2017 0 comments blog.sucuri.net Pen Testing & Audits

Coupon fraud could be costing your business millions

Coupon fraud comes in a variety of flavors. Normally, coupon transactions are simply data changing hands between the consumer, coupon providers and an agent that sorts and audits the coupons. Because there are so many layers, only one needs to be vulnerable to affect the whole supply chain. The Balance noted that shoppers often participate in coupon fraud by making multiple copies of the coupon, using the discount for products that extend beyond those listed in the terms, stealing newspaper i...

Nov. 13, 2017 0 comments blog.trendmicro.com Detection & Response

New FakeNet-NG Feature: Content-Based Protocol Detection

by Matthew Haigh, Michael Bailey , Peter Kacherginsky

I (Matthew Haigh) recently contributed to FLARE’s FakeNet-NG network simulator by adding content-based protocol detection and configuration. This feature is useful for analyzing malware that uses a protocol over a non-standard port; for example, HTTP over port 81. The new feature also detects and adapts to SSL so that any protocol can be used with SSL and handled appropriately by FakeNet-NG. We were motivated to add this feature since it was a feature of the original FakeNet and it was needed...

Nov. 13, 2017 0 comments www.fireeye.com Detection & Response

How to Install & Configure ModSecurity on Nginx

Nginx web server is used on more than 30% of website worldwide and growing. Considering the increase in online web threats, one the challenge for web engineer is to well aware of hardening and securing Nginx. Nginx is well-known for its performance and lightweight web server/proxy and used on many busiest sites. Pinterest.com Reddit.com WordPress.com Stackoverflow.com …

Nov. 13, 2017 0 comments www.pentestingexperts.com Apps & Hardening

WiFi Exploitation with WifiPhisher

Wifiphisher is a security tool that mounts automated victim-customized phishing attacks against WiFi clients in order to obtain credentials or infect the victims with malwares. It is primarily a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages (e.g. in social networks) or WPA/WPA2 pre-shared keys.

Nov. 13, 2017 0 comments www.pentestingexperts.com

WebDAV Traffic To Malicious Sites

by Didier Stevens

If observed WebDAV traffic to malicious sites in the past (in proxy logs), and recently I took some time to take a closer look. TL;DR: when files are retrieved remotely with the file:// URI scheme on Windows, Windows will fallback to WebDAV when SMB connections can not be established. I did my tests with 2 Windows 7 VMs on the same subnet, one Windows 7 machine with IIS/WebDAV, and the other Windows 7 machine with Word 2016 and a .docx document with a remote template (template.dotx) (us...

Nov. 13, 2017 0 comments blog.didierstevens.com Pen Testing & Audits

Moving Application Authentication to the Operating System

by Daniel Miessler

I think the only option for us is to solve authentication’s last mile problem, which will allow us to prove not just that a device made a request, but that the right person was using that device. This is the link that must occur in order for our operating system to be able to represent us. As I talk about in that piece, this means constantly taking multiple authentication points from us, from our gait, to our voice, to our typing patterns, ambient noise, motion sensors, and dozens of other...

Nov. 13, 2017 0 comments danielmiessler.com Apps & Hardening

Risk assessment: The first step in improving cyber security

by Michael Aminzade

PwC’s 2018 Information Security Survey, which surveyed more than 9,000 business and technology executives around the world, found that more than a quarter (28%) don’t know how many cyber-attacks they have suffered in total, and a third also don’t know how they occurred. While some security incidents are the result of high level attackers using advanced techniques to disguise their activity, the vast majority of cases are caused by common security failings and could be easily prevented with be...

Nov. 13, 2017 0 comments www.helpnetsecurity.com Management

Secure WordPress with X-Frame-Options & HTTPOnly Cookie

Protect WordPress website from XSS, Clickjacking Attacks Securing your website is essential for your online business presence. Over the weekend, I did a security scan against my WordPress website through Acunetix and Netsparker and found following vulnerabilities. Missing X-Frame-Options Header Cookie Not Marked as HttpOnly Cookie without Secure flag set If you are on dedicated or …

Nov. 12, 2017 0 comments www.pentestingexperts.com Apps & Hardening

Fancy Bear Microsoft Word attacks infect PCs sans macros

by Dan Goodin

Fancy Bear, the advanced hacking group researchers say is tied to the Russian government, is actively exploiting a newly revived technique that gives attackers a stealthy means of infecting computers using Microsoft Office documents, security researchers said this week. Fancy Bear is one of two Russian-sponsored hacking outfits researchers say breached Democratic National Committee networks ahead of last year's presidential election. The group was recently caught sending a Word document th...

Nov. 12, 2017 0 comments arstechnica.com Detection & Response

Triaging Alerts with Threat Indicators

by Gregory Pickett

Enterprises see more and more alerts every day. They are continually flooded with alerts, and the numbers keep increasing. Because analysts don’t know which ones indicate a genuine threat, they have to be gone through one at a time to find out. With not enough time in the day, some get ignored (Magee, 2017). There just isn’t enough time to get to them all. What if analysts could skip over those alerts that aren’t a threat and just focus their time on those that are? If they were able to do th...

Nov. 12, 2017 0 comments 10 minute read Detection & Response

The Internet, the Deep Web, and the Dark Web

by Daniel Miessler

The Dark Web (also called Darknet) is a subset of the Deep Web that is not only not indexed, but that also requires something special to be able to access it, e.g., specific proxying software or authentication to gain access. The Dark Web often sits on top of additional sub-networks, such as Tor, I2P, and Freenet, and is often associated with criminal activity of various degrees, including buying and selling drugs, pornography, gambling, etc. While the Dark Web is definitely used for nefa...

Nov. 12, 2017 0 comments danielmiessler.com Management

Post Exploitation in VMware Files with Meterpreter

Hello friends!! Today you will how to exploit any operation system running inside the virtual machine. Requrement Attacker: kali linux Target: VM image windows server 2012 First attacker needs to exploit actual operating system of victim PC and attain the meterpreter session with admin privileges. From given image you can perceive I have seize windows …

Nov. 12, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

MSSQL Penetration Testing with Metasploit

Requirement Attacker: kali Linux (NMAP) Target: Windows 10 (MS SQL Server) Let’s start!! MSSQL Brute force Attack This module simply queries the MSSQL instance for a specific user/pass (default is sa with blank). use auxiliary/scanner/mssql/mssql_login msf auxiliary(mssql_login) > set rhosts msf auxiliary(mssql_login) > set user_file /root/Desktop/user.txt msf auxiliary(mssql_login) > set pass_file /root/Desktop/pass.txt msf auxiliary(mssql_login) > run …

Nov. 12, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Beginner Guide to Classic Cryptography

Cryptography:  It is a technique of scrambling message using mathematical logic to keep the information secure. It preserve the scrambled message from being hacked when transport over unsecure network. Since it convert the readable message in unreadable text. Plaintext: It is the content of data which is in readable form that need to share over …

Nov. 11, 2017 0 comments www.pentestingexperts.com Encryption & Authentication

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

by Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov

Account takeover, or ‘hijacking’, is unfortunately a common problem for users across the web. More than 15% of Internet users have reported experiencing the takeover of an email or social networking account. However, despite its familiarity, there is a dearth of research about the root causes of hijacking. In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the cours...

Nov. 11, 2017 0 comments static.googleusercontent.com Encryption & Authentication

MSSQL Peneration Testing using Nmap | Pentesting Experts

Hello friends! Today we are going to perform Microsoft SQL penetration testing using NMAP scripts in order to retrieve basic information such as database name, usernames, tables name and etc from inside SQL server running on Windows operating system. In our previous article we had setup Microsoft SQL server in Windows 10. Requirement Attacker: kali …

Nov. 11, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits


We'll send you a carefully curated list of the best IT security white papers to your mailbox every Friday.