<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sam Stepanyan</title>
    <description>The latest articles on DEV Community by Sam Stepanyan (@securestep9).</description>
    <link>https://dev.to/securestep9</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F149313%2Fbfde4c5c-7176-4757-8657-e6dbba23b658.jpeg</url>
      <title>DEV Community: Sam Stepanyan</title>
      <link>https://dev.to/securestep9</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/securestep9"/>
    <language>en</language>
    <item>
      <title>Detecting Adobe ColdFusion CVE-2023–26360, Atlassian Confluence CVE-2023–22515, and Citrix…</title>
      <dc:creator>Sam Stepanyan</dc:creator>
      <pubDate>Sat, 18 Nov 2023 22:03:11 +0000</pubDate>
      <link>https://dev.to/securestep9/detecting-adobe-coldfusion-cve-2023-26360-atlassian-confluence-cve-2023-22515-and-citrix-2o8n</link>
      <guid>https://dev.to/securestep9/detecting-adobe-coldfusion-cve-2023-26360-atlassian-confluence-cve-2023-22515-and-citrix-2o8n</guid>
      <description>&lt;h3&gt;
  
  
  Detecting Adobe ColdFusion CVE-2023–26360, Atlassian Confluence CVE-2023–22515, and Citrix Netscaler CVE-2023–4966 with OWASP Nettacker(v0.3.2)
&lt;/h3&gt;

&lt;p&gt;On October 31st, 2023, the OWASP Nettacker project team released version 0.3.2 with new modules to scan networks for critical vulnerabilities. &lt;a href="https://owasp.org/www-project-nettacker/"&gt;The new modules include Adobe ColdFusion CVE-2023–26360, Atlassian Confluence CVE-2023–22515, and Citrix Netscaler CVE-2023–4966&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://owasp.org/nettacker"&gt;OWASP Nettacker&lt;/a&gt;r is an open-source software written in Python language that helps you perform tasks such as automated penetration testing and automated information gathering. It can run various scans using a variety of methods and generate scan reports (in HTML/TXT/JSON/CSV format) for applications and networks, including discovering open ports, services, bugs, vulnerabilities, misconfigurations, default credentials, subdomains, etc&lt;/p&gt;

&lt;p&gt;OWASP Nettacker can be run as a command-line utility (including running as a Docker container), API, Web GUI mode, or as Maltego transforms . It is written in 100% Python and does not rely on launching any external tools .&lt;/p&gt;

&lt;p&gt;The new Nettacker modules added in version 0.3.2 are designed to scan networks for the following critical vulnerabilities:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.cisa.gov/news-events/bulletins/sb23-086"&gt;Adobe ColdFusion CVE-2023–26360 is a deserialization of untrusted data vulnerability that could result in arbitrary code execution in the context of the current user &lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Atlassian Confluence CVE-2023–22515 is a privilege escalation vulnerability in Confluence Data Center and Server products.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.cisa.gov/guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966-citrix-bleed"&gt;Citrix Netscaler CVE-2023–4966&lt;/a&gt; (aka “CitrixBleed”) is a critical buffer overflow vulnerability that allows for sensitive information disclosure (e.g. session cookies) when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.&lt;/p&gt;

&lt;p&gt;OWASP Nettacker can also help you find instances of critically vulnerable MOVEit Transfer and Citrix CVE-2023–24488 in your network .&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.wired.com/story/moveit-breach-victims/"&gt;MOVEit Transfer, a widely-used file transfer software, has been affected by multiple critical vulnerabilities in 20231&lt;/a&gt;&lt;a href="https://www.theregister.com/2023/07/20/moveit_victim_count/"&gt;2&lt;/a&gt;&lt;a href="https://www.spiceworks.com/it-security/security-general/articles/moveit-vulnerability-impact-victims/"&gt;3&lt;/a&gt;. These vulnerabilities have led to significant security breaches, affecting numerous organisations and individuals.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.kroll.com/en/insights/publications/cyber/responding-critical-moveit-transfer-vulnerability-cve-2023-34362"&gt;MOVEit TRansfer vulnerabilities were exploited by multiple threat actors to gain unauthorized access to MOVEit servers, upload web shells, exfiltrate data, and initiate intrusion lifecycles8&lt;/a&gt;. &lt;a href="https://www.fortinet.com/blog/threat-research/moveit-transfer-critical-vulnerability-cve-2023-34362-exploited-as-a-0-day"&gt;High-profile government, finance, media, aviation, and healthcare organisations were reportedly affected&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The fallout from these vulnerabilities has been significant, with the costs tied to the MOVEit file transfer hack continuing to climb. The situation has led to multiple lawsuits against Progress Software, the owner of MOVEit, claiming that poor security led to the vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.wired.com/story/moveit-breach-victims/"&gt;It’s important to note that the full scale of the MOVEit attack is still unknown, and more victims may come forward in the future&lt;/a&gt;. This series of incidents underscores the importance of robust cybersecurity measures and timely patching of software vulnerabilities.&lt;/p&gt;

&lt;p&gt;Example — scanning for MOVEit Transfer vulnerable versions with Nettacker:&lt;br&gt;&lt;br&gt;
&lt;strong&gt;python3 nettacker.py -l target_list.txt -m moveit_version_scan&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dKHkLHOx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/828/0%2AS70o_K00pQ82mNzi" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dKHkLHOx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/828/0%2AS70o_K00pQ82mNzi" alt="" width="800" height="273"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Detecting MS Exchange CVE-2021–26855 vulnerability using OWASP Nettacker</title>
      <dc:creator>Sam Stepanyan</dc:creator>
      <pubDate>Wed, 17 Mar 2021 02:17:59 +0000</pubDate>
      <link>https://dev.to/securestep9/detecting-ms-exchange-cve-2021-26855-vulnerability-using-owasp-nettacker-440i</link>
      <guid>https://dev.to/securestep9/detecting-ms-exchange-cve-2021-26855-vulnerability-using-owasp-nettacker-440i</guid>
      <description>&lt;h3&gt;
  
  
  Detecting Microsoft Exchange CVE-2021–26855 vulnerability using OWASP Nettacker
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dnXImMFc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/586/1%2A8xd-6VQl56qg38bwDqN_CQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dnXImMFc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/586/1%2A8xd-6VQl56qg38bwDqN_CQ.png" alt="" width="586" height="618"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The whole month of March 2021 has been a crazy one in the world of cybersecurity.&lt;br&gt;&lt;br&gt;
Four zero-day vulnerabilities in Microsoft Exchange Server are being &lt;a href="https://www.zdnet.com/article/update-immediately-microsoft-rushes-out-patches-for-exchange-server-zero-day-attacks/"&gt;actively exploited&lt;/a&gt; by a state-sponsored threat group from China code-named HAFNIUM and these vulnerabilities appear to have been adopted by other cyberattackers in widespread attacks.&lt;/p&gt;

&lt;p&gt;According to Microsoft there are currently about &lt;a href="https://www.microsoft.com/security/blog/2021/03/12/protecting-on-premises-exchange-servers-against-recent-attacks/"&gt;82,000 MS Exchange servers&lt;/a&gt; still vulnerable.&lt;/p&gt;

&lt;p&gt;The are are 4 vulnerabilities used by these cyberattacks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26855"&gt;&lt;strong&gt;CVE-2021–26855&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;: CVSS 9.1:&lt;/strong&gt; a Server Side Request Forgery (SSRF) vulnerability leading to crafted HTTP requests being sent by unauthenticated attackers. Servers need to be able to accept untrusted connections over port 443 for the bug to be triggered.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26857"&gt;&lt;strong&gt;CVE-2021–26857&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;: CVSS 7.8:&lt;/strong&gt; an insecure deserialization vulnerability in the Exchange Unified Messaging Service, allowing arbitrary code deployment under SYSTEM. However, this vulnerability needs to be combined with another or stolen credentials must be used.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26858"&gt;&lt;strong&gt;CVE-2021–26858&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;: CVSS 7.8:&lt;/strong&gt; a post-authentication arbitrary file write vulnerability to write to paths.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27065"&gt;&lt;strong&gt;CVE-2021–27065&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;: CVSS 7.8:&lt;/strong&gt; a post-authentication arbitrary file write vulnerability to write to paths.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If used in an &lt;strong&gt;attack chain&lt;/strong&gt; , all of these vulnerabilities can lead to Remote Code Execution (RCE), server hijacking, backdoors, data theft, and further malware deployment. However it is the first vulnerability in the attack chain:&lt;br&gt;&lt;br&gt;
&lt;strong&gt;CVE-2021–26855 which opens doors to all other vulnerabilities — &lt;/strong&gt; it is the most important one to detect the presence of.&lt;/p&gt;

&lt;p&gt;Please Note that &lt;a href="https://techcommunity.microsoft.com/t5/exchange-team-blog/released-march-2021-exchange-server-security-updates/ba-p/2175901"&gt;&lt;strong&gt;&lt;em&gt;Patches&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;have been released by Microsoft and a &lt;strong&gt;o&lt;/strong&gt; &lt;a href="https://therecord.media/microsoft-shares-one-click-mitigation-tool-for-exchange-servers/"&gt;*&lt;em&gt;ne-click mitigation tool is available *&lt;/em&gt;&lt;/a&gt; &lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Unprotected MS Exchange servers need to urgently be updated before they’re discovered by cybercriminals. How do you know if you have any vulnerable MS Exchange Servers in your network?&lt;/p&gt;

&lt;p&gt;In order to patch/apply mitigation to your vulnerable MS Exchange servers you need to be able to find them first! IT Asset inventory is a big problem in information security/cyber security nowadays as it is the devices/services/servers you don’t know about which pose the biggest risk!&lt;/p&gt;

&lt;p&gt;OWASP Nettacker — a free and open-source tool from OWASP to the rescue! Since Wednesday 17th March 2021 it has been updated with a module which allows detection of vulnerable Exchange servers. You can launch this tool on your network IP ranges or domain name to discover the vulnerable servers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;DISCLAIMER: OWASP Nettacker is as an offensive security tool for assisting with recon/information gathering/vulnerability scanning/penetration testing tasks. Use it with caution only on networks and servers you own and have permission to scan&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Please note that many cybersecurity vendors are currently offering to scan your network for this vulnerability only if you become their subscribers on commercial basis.&lt;/p&gt;

&lt;p&gt;Please also note that Microsoft has released a &lt;strong&gt;free&lt;/strong&gt; scanning tool implemented using &lt;strong&gt;Powershell&lt;/strong&gt; &lt;a href="https://github.com/microsoft/CSS-Exchange/blob/main/Security/src/Test-ProxyLogon.ps1"&gt;&lt;strong&gt;here&lt;/strong&gt;&lt;/a&gt; as well as an Nmap Script &lt;a href="https://github.com/microsoft/CSS-Exchange/blob/main/Security/src/http-vuln-cve2021-26855.nse"&gt;&lt;strong&gt;http-vuln-cve2021–26855.nse&lt;/strong&gt;&lt;/a&gt; . However these tools have certain limitations and require certain skills. If you are not comfortable using these scripts OWASP Nettacker can help. Nettacker even has a docker version and a Web User Interface to help you to scan your network for vulnerabilities for free in the most user-friendly way.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.owasp.org/index.php/OWASP_Nettacker"&gt;OWASP Nettacker&lt;/a&gt;project can help you address the task of scanning multiple servers for this vulnerability as well as the task of finding the vulnerable servers in your network.&lt;/p&gt;

&lt;p&gt;What is &lt;a href="https://owasp.org/www-project-nettacker"&gt;&lt;strong&gt;OWASP Nettacker&lt;/strong&gt;&lt;/a&gt;? OWASP Nettacker in a nutshell is a Swiss Army Knife for Reconnaissance &amp;amp; Vulnerability Scanning — it is a relatively new OWASP project written in Python consisting of multiple &lt;em&gt;modules&lt;/em&gt; which can be used from the single command line (use one or a combination of modules) against a target or a list of targets to perform an information gathering scan or a vulnerability detection scan.&lt;/p&gt;
&lt;h3&gt;
  
  
  Downloading and running OWASP Nettacker using Python
&lt;/h3&gt;

&lt;p&gt;I usually run OWASP Nettacker on my KALI Linux VM, but because OWASP Nettacker is written in Python it can be run on any Linux/Mac/Windows system — provided you have Python2 or Python3 installed. Nettacker currently supports Python version 2.7, 3.6, 3.7 and 3.8. Some functionality can be broken in Python 3.9 so it is not recommended yet. You can use a tool like &lt;em&gt;pyenv&lt;/em&gt; to switch between different versions of Python&lt;/p&gt;

&lt;p&gt;You can install OWASP Nettacker by doing a ‘git clone &lt;a href="https://github.com/zdresearch/OWASP-Nettacker"&gt;https://github.com/OWASP/Nettacker&lt;/a&gt;’ from GitHub and installing the Python dependencies using a single command like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;git clone [https://github.com/OWASP/Nettacker.git](https://github.com/zdresearch/OWASP-Nettacker.git) &amp;amp;&amp;amp; cd Nettacker &amp;amp;&amp;amp; pip install -r requirements.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If you hit any issues please check the Installation section in the OWASP Nettacker Wiki here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/OWASP/Nettacker/wiki/Installation"&gt;OWASP/Nettacker&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Running a Nettacker Scan from the Command Line
&lt;/h3&gt;

&lt;p&gt;Once OWASP Nettacker is installed change directory to Nettacker:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cd Nettacker
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now you can run the tool using Python specifying that you need the module msexchange_cve_2021_26855_vuln in &lt;strong&gt;-m&lt;/strong&gt; command line switch and your target (IP/IP range/FQDN) in &lt;strong&gt;-i&lt;/strong&gt; like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i &amp;lt;target&amp;gt; -m msexchange_cve_2021_26855_vuln
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;to scan a single IP address (xxx.xxx.xxx.xxx):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i xxx.xxx.xxx.xxx -m msexchange_cve_2021_26855_vuln
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;However if you don’t know how many Exchange servers you have and their precise IP addresses you can use OWASP Nettacker to scan a whole IP range (e.g. xxx.xxx.xxx.xxx/24):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i xxx.xxx.xxx.xxx/24 -m msexchange_cve_2021_26855_vuln
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If you don’t know the IP address ranges of your network but do know that Exchange servers have subdomains (e.g. owa.mycompany.com, exchange.mycompany.com, mail.mycompany.com etc) you can ask Nettacker to enumerate subdomains and test them for MS Exchange vulnerability like this (please note the &lt;strong&gt;-s&lt;/strong&gt; command like switch which instructs Nettacker to discover the subdomains of the domain name listed in the &lt;strong&gt;-i&lt;/strong&gt;  ):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i mycompany.com -s -m msexchange_cve_2021_26855_vuln
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If you have the list of IPs/FQDNs of your networks saved in a file called &lt;strong&gt;list.txt&lt;/strong&gt; (one line per IP or FQDN) you can scan all the servers in your list using the &lt;strong&gt;-l&lt;/strong&gt; command line switch:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -l list.txt -m msexchange_cve_2021_26855_vuln
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If you would like to save the OWASP Nettacker report in JSON format instead of the default HTML format you can specify the report output filename using the &lt;strong&gt;-o&lt;/strong&gt; command line switch (-o report.json) for example&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i xxx.xxx.xxx.xxx/24 -m msexchange_cve_2021_26855_vuln -o report.json
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;OWASP Nettacker is also capable of reporting in CSV format which is very handy as it can be opened and processed with Microsoft Excel — simply specify the report output filename with a  &lt;strong&gt;.csv&lt;/strong&gt; extension using the &lt;strong&gt;-o&lt;/strong&gt; command line switch ( &lt;strong&gt;-o report.csv&lt;/strong&gt; ) for example&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i xxx.xxx.xxx.xxx/24 -m msexchange_cve_2021_26855_vuln -o report.csv
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;It is also possible to run Nettacker using Docker:&lt;/p&gt;

&lt;h3&gt;
  
  
  Running Nettacker Scan with Docker &amp;amp; WebUI
&lt;/h3&gt;

&lt;p&gt;The easiest way to run Nettacker is with Docker. This way you will avoid installing multiple Python dependencies and resolving library/Python version incompatibilities.&lt;/p&gt;

&lt;p&gt;Here is how to do it :&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;git clone [https://github.com/OWASP/Nettacker.git](https://github.com/zdresearch/OWASP-Nettacker.git) &amp;amp;&amp;amp; cd Nettacker
docker-compose up
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Wait for docker-compose to finish downloading &amp;amp; building the service.You will see a screen like this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fA7LQg5l--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/586/1%2AvMVItMY5cn-U9uonIc9lkg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fA7LQg5l--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/586/1%2AvMVItMY5cn-U9uonIc9lkg.png" alt="" width="586" height="451"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Grab the API key (copy it) and open your browser and navigate to &lt;a href="https://127.0.0.1:5000"&gt;https://127.0.0.1:5000&lt;/a&gt; (accept security warnings)&lt;/p&gt;

&lt;p&gt;You will see the OWASP Nettacker Web UI:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ixTndY9Y--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/997/1%2Af_hCBJe2UOvJjWImnoK0sA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ixTndY9Y--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/997/1%2Af_hCBJe2UOvJjWImnoK0sA.png" alt="" width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Paste the API Key (you have just copied) into the API Key box on the right and click the ‘Set Session’ button:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Fg3-s2CR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1001/1%2AzJtbIXjVA9Qy1gV8h3hwOA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Fg3-s2CR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1001/1%2AzJtbIXjVA9Qy1gV8h3hwOA.png" alt="" width="800" height="462"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now click on the &lt;strong&gt;New Scan&lt;/strong&gt; button and in the &lt;strong&gt;Targets&lt;/strong&gt; box type the target you want to scan (e.g. an IP range like 10.63.11.0/24) and tick the box for vulnerability msexchange_cve_2021_26855:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--e-92TsPA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/983/1%2AwcYyzGoftxL6t30ACMSmsA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--e-92TsPA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/983/1%2AwcYyzGoftxL6t30ACMSmsA.png" alt="" width="800" height="586"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now scroll down and click the &lt;strong&gt;Submit&lt;/strong&gt;  button:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--0nV3s7XF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/599/1%2AWNWiOK6OyxabGEjqCHgEWA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--0nV3s7XF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/599/1%2AWNWiOK6OyxabGEjqCHgEWA.png" alt="" width="599" height="326"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click the ‘Results’ button and wait for the results to appear on the list. You might need to click on the &lt;strong&gt;Last Update&lt;/strong&gt; button several times until the results appears — it might take a few minutes depending on the number of servers Nettacker needs to scan. Click on the results and they will be shown in a table like this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--3pcU5aJJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/709/1%2AORr-u0ieIxEwN8z73I0UKw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--3pcU5aJJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/709/1%2AORr-u0ieIxEwN8z73I0UKw.png" alt="" width="709" height="644"&gt;&lt;/a&gt;the image is redacted to protect the identity of not yet patched servers&lt;/p&gt;

&lt;p&gt;That’s it! I hope you enjoyed using OWASP Nettacker!&lt;/p&gt;

&lt;p&gt;I presented OWASP Nettacker at several conferences — you can find &lt;a href="https://speakerdeck.com/samstepanyanowasp/introducing-the-owasp-nettacker-project"&gt;slides&lt;/a&gt; and &lt;a href="https://www.youtube.com/watch?v=vNNDC_ScxCA"&gt;videos&lt;/a&gt; on YouTube.&lt;/p&gt;

&lt;h3&gt;
  
  
  What to do if you’ve already been compromised
&lt;/h3&gt;

&lt;p&gt;The United States Government Cybersecurity and Infrastructure Security Agency has created a &lt;a href="https://us-cert.cisa.gov/ncas/alerts/aa21-062a"&gt;victim response guide&lt;/a&gt; specifically for the Microsoft Exchange flaw CVE-2021–26855.&lt;/p&gt;

&lt;p&gt;The guide, known as &lt;a href="https://us-cert.cisa.gov/ncas/alerts/aa21-062a"&gt;CISA Alert AA21–062A&lt;/a&gt;, explains how to conduct a forensic analysis to assist remediation efforts.&lt;/p&gt;

&lt;p&gt;To respond more efficiently to this current Exchange threat and all future cyber threats, it’s important to have a clear and up-to-date &lt;strong&gt;Incident Response Plan (IRP).&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To assist with the development of a highly-effective Incident Response Plan, refer to &lt;a href="https://us-cert.cisa.gov/ncas/alerts/aa20-245a"&gt;CISA Alert AA20–245A&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Follow me on Twitter:&lt;/em&gt; &lt;a href="https://twitter.com/securestep9"&gt;&lt;em&gt;https://twitter.com/securestep9&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cve202126855</category>
      <category>proxylogon</category>
      <category>hafnium</category>
    </item>
    <item>
      <title>OWASP, DevSecOps, AppSec &amp; Cloud Security Podcasts</title>
      <dc:creator>Sam Stepanyan</dc:creator>
      <pubDate>Mon, 27 Apr 2020 21:36:49 +0000</pubDate>
      <link>https://dev.to/securestep9/owasp-devsecops-appsec-cloud-security-podcasts-3ilc</link>
      <guid>https://dev.to/securestep9/owasp-devsecops-appsec-cloud-security-podcasts-3ilc</guid>
      <description>&lt;h3&gt;
  
  
  OWASP, DevSecOps, AppSec &amp;amp; Cloud Security Podcasts
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--gVOfjWYF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1024/1%2APGrwAlynp-Cc5T19y7SSlw.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--gVOfjWYF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1024/1%2APGrwAlynp-Cc5T19y7SSlw.jpeg" alt="" width="800" height="534"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I was recently asked which OWASP/DevSecOps/Application Security/Cloud Security-themed podcasts I listen to.&lt;/p&gt;

&lt;p&gt;Here’s the list:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;(please note that these podcasts are available on all/most podcasts platforms, in this list I only provide the Google Podcasts links):&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Application Security Podcast (produced by Chris Romeo/ Security Journey)&lt;/strong&gt;: &lt;a href="https://podcast.securityjourney.com/application-security-podcast/episodes/"&gt;https://podcast.securityjourney.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OWASP Podcast&lt;/strong&gt; (now known as &lt;strong&gt;DevSecOps Podcast&lt;/strong&gt; Supported by OWASP — produced by Mark Miller — interview format): &lt;a href="https://soundcloud.com/owasp-podcast"&gt;https://soundcloud.com/owasp-podcast&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BeerSecOps — &lt;/strong&gt; Podcast About Dev, Sec, Ops, and Everything in Between (run be Steve Giguere/AquaSec - Interview format): &lt;a href="https://podcasts.google.com/?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9mMzg2Njg0L3BvZGNhc3QvcnNz"&gt;https://podcasts.google.com/?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9mMzg2Njg0L3BvZGNhc3QvcnNz&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;DevSecOps Overflow&lt;/strong&gt; (produced by Michael Man, interview format) &lt;strong&gt;:&lt;/strong&gt; &lt;a href="https://podcasts.google.com/?feed=aHR0cHM6Ly9mZWVkcy5idXp6c3Byb3V0LmNvbS83MzMwNzAucnNz"&gt;https://podcasts.google.com/?feed=aHR0cHM6Ly9mZWVkcy5idXp6c3Byb3V0LmNvbS83MzMwNzAucnNz&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Absolute AppSec(&lt;/strong&gt;produced by Ken Johnson and Seth Law, chat with guests) &lt;a href="https://podcasts.google.com/?feed=aHR0cHM6Ly9hYnNvbHV0ZWFwcHNlYy5jb20vcnNzLnhtbA"&gt;https://podcasts.google.com/?feed=aHR0cHM6Ly9hYnNvbHV0ZWFwcHNlYy5jb20vcnNzLnhtbA&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Security Podcast&lt;/strong&gt; : &lt;a href="https://podcasts.google.com/?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy8xMGZiOTkyOC9wb2RjYXN0L3Jzcw&amp;amp;ved=2ahUKEwiHte_Uu4npAhUShhoKHcTBCLYQ4aUDegQIARAC"&gt;https://podcasts.google.com/?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy8xMGZiOTkyOC9wb2RjYXN0L3Jzcw&amp;amp;ved=2ahUKEwiHte_Uu4npAhUShhoKHcTBCLYQ4aUDegQIARAC&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Secure Developer Podcast&lt;/strong&gt; (produced by Heavybit, interview format): &lt;a href="https://podcasts.google.com/?feed=aHR0cHM6Ly93d3cuaGVhdnliaXQuY29tL2NhdGVnb3J5L2xpYnJhcnkvcG9kY2FzdHMvdGhlLXNlY3VyZS1kZXZlbG9wZXIvZmVlZA&amp;amp;ved=0CB0Q27cFahcKEwi4kpi8uonpAhUAAAAAHQAAAAAQBw"&gt;https://podcasts.google.com/?feed=aHR0cHM6Ly93d3cuaGVhdnliaXQuY29tL2NhdGVnb3J5L2xpYnJhcnkvcG9kY2FzdHMvdGhlLXNlY3VyZS1kZXZlbG9wZXIvZmVlZA&amp;amp;ved=0CB0Q27cFahcKEwi4kpi8uonpAhUAAAAAHQAAAAAQBw&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;DevSecOps Talk Podcast&lt;/strong&gt; (Mattias Hemmingsson, Julien Bisconti and Andrey Devyatkin chat about latest stuff, and ideas): &lt;a href="https://podcasts.google.com/?feed=aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2RldnNlY29wcy9mZWVkLnhtbA"&gt;https://podcasts.google.com/?feed=aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2RldnNlY29wcy9mZWVkLnhtbA&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Detecting Citrix CVE-2019–19781 with OWASP Nettacker</title>
      <dc:creator>Sam Stepanyan</dc:creator>
      <pubDate>Sat, 11 Jan 2020 17:23:31 +0000</pubDate>
      <link>https://dev.to/securestep9/detecting-citrix-cve-2019-19781-with-owasp-nettacker-3o66</link>
      <guid>https://dev.to/securestep9/detecting-citrix-cve-2019-19781-with-owasp-nettacker-3o66</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7na4KA8f--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2Ae_NM3WEsJ-NVBVRk79liJw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7na4KA8f--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2Ae_NM3WEsJ-NVBVRk79liJw.png" alt="OWASP Nettacker screenshot showing detected and vulnerable Citrix device"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Citrix CVE-2019–19781 vulnerability is the current hot topic in Information Security circles this week, as exploits for this vulnerability are now publicly available and may allow unauthenticated attackers to obtain direct access to the company’s local network from the Internet. Citrix NetScaler ADC and Gateway products are vulnerable.&lt;/p&gt;

&lt;p&gt;According to cybersecurity expert &lt;a href="https://medium.com/u/7db6d2df42a6"&gt;Kevin Beaumont&lt;/a&gt; (aka GossiTheDog on Twitter) who runs a network of Citrix ADC honeypots the active exploitation of CVE-2019–19781 started on January 8th, 2020:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/GossiTheDog/status/1214892555306971138"&gt;https://twitter.com/GossiTheDog/status/1214892555306971138&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;According to various estimates 40,000–80,000 organisations worldwide might be affected and vulnerable! Which means that hackers might be able to sneak in to your corporate network through the devices which are supposed to be the gatekeepers into your network! Not good.&lt;/p&gt;

&lt;p&gt;Citrix have released the mitigation, which is effectively a policy which detects and blocks the attempts to exploit the attack, however there is no proper patch released yet (as of 10th January 2020) which would fix the underlying problem in the software code.&lt;/p&gt;

&lt;p&gt;I strongly advise all organisations with NetScaler/ADC to apply the Citrix mitigation immediately to avoid compromise — the steps to mitigate the vulnerability are documented in the following Citrix Support Article :&lt;/p&gt;

&lt;p&gt;&lt;a href="https://support.citrix.com/article/CTX267027"&gt;CVE-2019-19781 - Vulnerability in Citrix Application Delivery Controller and Citrix Gateway&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;However, in order to patch/apply mitigation to your vulnerable Citrix devices you need to be able to find them first ! IT Asset inventory is a big problem in information security/cyber security as it is the devices/services/servers you don’t know about which pose the biggest risk.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.owasp.org/index.php/OWASP_Nettacker"&gt;OWASP Nettacker&lt;/a&gt; project can help you address the task of scanning multiple devices for this vulnerability as well as the task of finding the vulnerable devices in your network.&lt;/p&gt;

&lt;p&gt;What is OWASP Nettacker? OWASP Nettacker in a nutshell is a Swiss Army Knife for Reconnaissance &amp;amp; Vulnerability Scanning — it is a relatively new OWASP project written in Python consisting of multiple &lt;em&gt;modules&lt;/em&gt; (63 at the time of writing) which can be used from the single command line (use one or a combination of modules) against a target or a list of targets to perform an information gathering scan or a vulnerability detection scan.&lt;/p&gt;

&lt;p&gt;Last night I added a new vulnerability detection module to OWASP Nettacker: citrix_cve_2019_19781_vuln making it the 63rd tool in this framework.&lt;/p&gt;

&lt;p&gt;I usually run OWASP Nettacker on my KALI Linux VM, but because OWASP Nettacker is written in Python it can be run on any Linux/Mac/Windows system— provided you have Python2 and Python3 installed.&lt;/p&gt;

&lt;p&gt;You can install OWASP Nettacker by doing a ‘git clone &lt;a href="https://github.com/zdresearch/OWASP-Nettacker"&gt;https://github.com/zdresearch/OWASP-Nettacker&lt;/a&gt;’ from GitHub and installing the Python dependencies using a single command like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;git clone https://github.com/zdresearch/OWASP-Nettacker.git &amp;amp;&amp;amp; cd OWASP-Nettacker &amp;amp;&amp;amp; pip install -r requirements.txt &amp;amp;&amp;amp; python setup.py install
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;If you hit any issues please check the Installation section in the OWASP Nettacker Wiki here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/zdresearch/OWASP-Nettacker/wiki/Installation"&gt;zdresearch/OWASP-Nettacker&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once OWASP Nettacker is installed change directory to OWASP-Nettacker:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cd OWASP-Nettacker
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;Now you can run the tool using Python specifying that you need the module citrix_cve_2019_19781_vuln in &lt;strong&gt;-m&lt;/strong&gt; command line switch and your target (IP/IP range/FQDN) in &lt;strong&gt;-i&lt;/strong&gt; like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i &amp;lt;target&amp;gt; -m citrix_cve_2019_19781_vuln
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;to scan a single IP address (xxx.xxx.xxx.xxx):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i xxx.xxx.xxx.xxx -m citrix_cve_2019_19781_vuln
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;However if you don’t know how many Citrix devices you have and their precise IP addresses you can use OWASP Nettacker to scan a whole IP range (e.g. xxx.xxx.xxx.xxx/24):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i xxx.xxx.xxx.xxx/24 -m citrix_cve_2019_19781_vuln
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;If you don’t know the IP address ranges of your network but do know that Citrix devices have subdomains (e.g. remote.mycompany.com, vpn.mycompany.com, access.mycompany.com etc) you can ask Nettacker to enumerate subdomains and test them for Citrix vulnerability like this (please note the &lt;strong&gt;-s&lt;/strong&gt; command like switch which instructs Nettacker to discover the subdomains of the domain name listed in the &lt;strong&gt;-i&lt;/strong&gt;  ):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i mycompany.com -s -m citrix_cve_2019_19781_vuln
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;If you have the list of IPs/FQDNs of your Citrix devices saved in a file called &lt;strong&gt;list.txt&lt;/strong&gt; (one line per IP or FQDN) you can scan all the devices in your list using the &lt;strong&gt;-l&lt;/strong&gt; command line switch:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -l list.txt -m citrix_cve_2019_19781_vuln
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;If you would like to save the OWASP Nettacker report in JSON format instead of the default HTML format you can specify the report output filename using the &lt;strong&gt;-o&lt;/strong&gt; command line switch (-o filename.json) for example&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python nettacker.py -i xxx.xxx.xxx.xxx/24 -m citrix_cve_2019_19781_vuln -o report.json
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;...&lt;/p&gt;

&lt;p&gt;Follow me on Twitter: &lt;a href="https://twitter.com/securestep9"&gt;https://twitter.com/securestep9&lt;/a&gt;&lt;/p&gt;

</description>
      <category>owaspnettacker</category>
      <category>citrixcve</category>
      <category>cve201919781</category>
    </item>
    <item>
      <title>UK Monthly Salary &amp; Tax</title>
      <dc:creator>Sam Stepanyan</dc:creator>
      <pubDate>Wed, 06 Nov 2019 22:08:35 +0000</pubDate>
      <link>https://dev.to/securestep9/uk-monthly-salary-tax-1lhp</link>
      <guid>https://dev.to/securestep9/uk-monthly-salary-tax-1lhp</guid>
      <description>&lt;p&gt;This post is not Cyber Security related. A lot of my friends (who do work in IT and InfoSec/CyberSecurity fields), live in different countries (and are thinking of moving to the UK before the Brexit hits) keep asking me about the levels of salaries and tax in the UK.&lt;/p&gt;

&lt;p&gt;I have therefore compiled this little helper table to help them understand how the annual salary in the UK (in tax year 2019–2020) translates into the monthly amount they will get in the bank after tax deductions (this is also known as “take home monthly” pay):&lt;/p&gt;


&lt;div class="ltag_gist-liquid-tag"&gt;
  
&lt;/div&gt;


&lt;p&gt;Since I received many thanks from my friends, I think it will be useful for everyone, so publishing this in my blog.&lt;/p&gt;

&lt;p&gt;Data source: listentotaxman.com&lt;/p&gt;

</description>
    </item>
    <item>
      <title>CyberSecurity/InfoSec/AppSec Meetups/Events in London</title>
      <dc:creator>Sam Stepanyan</dc:creator>
      <pubDate>Wed, 13 Feb 2019 02:31:54 +0000</pubDate>
      <link>https://dev.to/securestep9/cybersecurity-infosec-appsec-meetups-events-in-london-2na1</link>
      <guid>https://dev.to/securestep9/cybersecurity-infosec-appsec-meetups-events-in-london-2na1</guid>
      <description>&lt;h3&gt;
  
  
  CyberSecurity/InfoSec/AppSec Conferences/Meetups/Events in London
&lt;/h3&gt;

&lt;p&gt;Quite often I am being asked the question: which Cyber Security — themed meetups/events/conferences are happening in London and which ones are worth attending?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsr3itsvhcyltpxx8ltc9.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsr3itsvhcyltpxx8ltc9.jpeg" width="600" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;First of all as a Chapter Leader of OWASP London Chapter of course I need to mention our OWASP London Chapter Meetups (or “Chapter Meetings”) which have been running regularly in London since 2004!&lt;/p&gt;

&lt;p&gt;The very first OWASP London Chapter Meeting took place on Tuesday 19th October 2004 at The George pub near Holborn tube (see &lt;a href="http://lists.owasp.org/pipermail/owasp-london/2004-October/000032.html" rel="noopener noreferrer"&gt;http://lists.owasp.org/pipermail/owasp-london/2004-October/000032.html&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6fnaj8pi1let3pis0no8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6fnaj8pi1let3pis0no8.png" width="800" height="414"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The first OWASP London meetup was organised and attended by:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dinis Cruz (now the CISO of Photobox)&lt;/li&gt;
&lt;li&gt;Daniel Cuthbert (now the Global Head of CyberSecurity Research at Santander Bank)&lt;/li&gt;
&lt;li&gt;Dafydd Stuttard (now CEO of Portswigger/creator of Burp Scanner / Burp Suite)&lt;/li&gt;
&lt;li&gt;Ivan Ristic (the person behind SSL Labs/Qualys/Let’s Encrypt, now at FeistyDuck/Hardenize)&lt;/li&gt;
&lt;li&gt;Peter Wood (now CEO of FirstBase)&lt;/li&gt;
&lt;li&gt;Gunter Ollman (now the CSO of Microsoft Cloud and AI Security Division, previously the CTO of IOActive)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now in year 2019 the London chapter meetups attract audience of 200+people ! If you would like to attend our events please follow OWASP London Chapter on:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Twitter&lt;/strong&gt; : &lt;a href="https://twitter.com/owasplondon" rel="noopener noreferrer"&gt;@owasplondon&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Facebook&lt;/strong&gt; : &lt;a href="https://www.facebook.com/OWASPLondon" rel="noopener noreferrer"&gt;https://www.facebook.com/OWASPLondon&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Webpage&lt;/strong&gt; : &lt;a href="https://www.owasp.org/index.php/London" rel="noopener noreferrer"&gt;https://www.owasp.org/index.php/London&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Meetup&lt;/strong&gt; : &lt;a href="https://www.meetup.com/OWASP-London/" rel="noopener noreferrer"&gt;https://www.meetup.com/OWASP-London/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;LinkedIN&lt;/strong&gt; : &lt;a href="https://www.linkedin.com/company/owasplondon/" rel="noopener noreferrer"&gt;https://www.linkedin.com/company/owasplondon/&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  CyberSecurity Conferences in London
&lt;/h3&gt;

&lt;p&gt;First of all it is important to list the following major conferences:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SC Congress&lt;/strong&gt;  — &lt;a href="https://www.sccongressuk.com" rel="noopener noreferrer"&gt;https://www.sccongressuk.com&lt;/a&gt;
More suitable for decision-makers than techies. &lt;strong&gt;Free&lt;/strong&gt;. At ILEC centre annually in  &lt;strong&gt;February&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cloud Security Expo&lt;/strong&gt; at Excel &lt;a href="https://www.cloudsecurityexpo.com/" rel="noopener noreferrer"&gt;https://www.cloudsecurityexpo.com/&lt;/a&gt;
this Expo &amp;amp; Conference is co-located with IoT, DevOps,BigData and BlockChain expos. Free to attend, lots of great tech and higher level talks — happens annually in &lt;strong&gt;March&lt;/strong&gt; at Excel Expo Centre.  &lt;strong&gt;Free.&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CRESTCon&lt;/strong&gt;  — &lt;a href="http://www.crestcon.co.uk/" rel="noopener noreferrer"&gt;http://www.crestcon.co.uk/&lt;/a&gt;
Council for Registered Ethical Security Testers (CREST) is the main accreditation body for penetration testing companies and they have their annual conference in London in &lt;strong&gt;April&lt;/strong&gt; at the Royal College of Physicians (Regents Park). Tickets &lt;strong&gt;£125-£200&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Summit London -&lt;/strong&gt; &lt;a href="https://aws.amazon.com/events/summits/london/?" rel="noopener noreferrer"&gt;https://aws.amazon.com/events/summits/london&lt;/a&gt;
AWS is the number 1 Cloud Services Provider in the world at the moment and they have their massive Annual AWS Summit conference in London (usually run at Excel Expo Centre in May) with lots of talks and sessions around Cloud technologies and Cloud Security. &lt;strong&gt;Free&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Information Security Europe (aka InfoSec Europe)&lt;/strong&gt; at Olympia &lt;a href="https://www.infosecurityeurope.com/" rel="noopener noreferrer"&gt;https://www.infosecurityeurope.com/&lt;/a&gt; — the original Expo &amp;amp; conference which has been running for many years. InfoSec Europe happens annually in &lt;strong&gt;June&lt;/strong&gt;.  &lt;strong&gt;Free.&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;BSides London&lt;/strong&gt;  — &lt;a href="https://www.securitybsides.org.uk/" rel="noopener noreferrer"&gt;&lt;strong&gt;https://www.securitybsides.org.uk/&lt;/strong&gt;&lt;/a&gt; Hacker community conference, happens annually in &lt;strong&gt;June&lt;/strong&gt; at the ILEC Centre. Tickets from &lt;strong&gt;Free&lt;/strong&gt; to £50 (Free tickets get sold out very quickly — within minutes). Great technical talks and training workshops from notable security speakers. If you miss tickets to BSides London — don’t despair as Security BSides conferences happen in many places in the UK and all-over the world — just find one in a city close to you (in the UK we have BSides Belfast, BSides Leeds, BSides Manchester, BSides Scotland (Edinburgh).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;44CON&lt;/strong&gt;  — &lt;strong&gt; &lt;/strong&gt; &lt;a href="https://44con.com/" rel="noopener noreferrer"&gt;&lt;strong&gt;https://44con.com/&lt;/strong&gt;&lt;/a&gt;
Local DefCon-style hacking conference. Covers topics such as internet security, IoT, vulnerability discovery, and new exploit techniques. Great technical talks and training workshops from notable security speakers. Tickets: &lt;strong&gt;£300-£1300&lt;/strong&gt; , but the &lt;strong&gt;first day is Free&lt;/strong&gt;. Happens annually in &lt;strong&gt;September&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cyber Security X Europe/ IP Expo Europe&lt;/strong&gt; -&lt;a href="https://ipexpoeurope.com/europe/en/page/dtx-europe" rel="noopener noreferrer"&gt;&lt;strong&gt;https://ipexpoeurope.com&lt;/strong&gt;&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Free to attend , lots of great technical and higher level talks — happens annually in &lt;strong&gt;October&lt;/strong&gt; at Excel Expo Centre.  &lt;strong&gt;Free&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;DevSecCon London — &lt;/strong&gt; &lt;a href="https://www.devseccon.com/" rel="noopener noreferrer"&gt;&lt;strong&gt;https://www.devseccon.com/&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt; &lt;/strong&gt; — happens annually in &lt;strong&gt;October-November&lt;/strong&gt; , tickets &lt;strong&gt;£200-£300 ,&lt;/strong&gt; lots of great technical talks and training workshops&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;BlackHat Europe&lt;/strong&gt;  — &lt;strong&gt; &lt;/strong&gt; &lt;a href="https://www.blackhat.com/eu-18/" rel="noopener noreferrer"&gt;&lt;strong&gt;https://www.blackhat.com/eu-18/&lt;/strong&gt;&lt;/a&gt;
Hacking conference and expo, great hacking talks annually in &lt;strong&gt;December&lt;/strong&gt; at Excel. Tickets &lt;strong&gt;£1500-£1900&lt;/strong&gt; , however the &lt;strong&gt;Expo&lt;/strong&gt; floor (live demos!) is  &lt;strong&gt;Free.&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;CyberSecurity Meetups in London&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Meetups are free to attend, but registration is required in advance and is essential, some venues require a form of ID to be admitted to the event.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/OWASP-London/" rel="noopener noreferrer"&gt;OWASP London&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/DevSecOps-London-Gathering/" rel="noopener noreferrer"&gt;DevSecOps - London Gathering&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/London-Cyber-Capital-One/" rel="noopener noreferrer"&gt;London Cyber Security Meet Up hosted by Capital One&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/The-Many-Hats-Club/" rel="noopener noreferrer"&gt;The Many Hats Club&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/LDN-Security-Community-Meetup" rel="noopener noreferrer"&gt;LDN Security Community Meetup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/Countercept/" rel="noopener noreferrer"&gt;Cybersecurity with Countercept&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/SecTalks-London/" rel="noopener noreferrer"&gt;SecTalks London&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.eventbrite.com/e/hacksoho-a-trip-to-the-dark-side-of-the-moon-tickets-53536096907?aff=ebdssbdestsearch#" rel="noopener noreferrer"&gt;HACK::SOHO - A Trip To The Dark Side Of the Moon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/London-DevOps/" rel="noopener noreferrer"&gt;London DevOps&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/Docker-London/" rel="noopener noreferrer"&gt;Docker London&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/Linuxing-In-London/" rel="noopener noreferrer"&gt;Linuxing In London&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/Veracode-DevSecOps-Meetup-London/" rel="noopener noreferrer"&gt;Veracode DevSecOps Meetup - London&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/London-IT-Security-Talks/" rel="noopener noreferrer"&gt;London IT Security Talks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/London-DevSecOps-Meetup/" rel="noopener noreferrer"&gt;London DevSecOps Meetup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/LLHS-Ladies-of-London-Hacking-Society/" rel="noopener noreferrer"&gt;LLHS Ladies of London Hacking Society&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.eventbrite.co.uk/o/issa-uk-1588320960" rel="noopener noreferrer"&gt;ISSA-UK&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dc4420.org" rel="noopener noreferrer"&gt;DC4420&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More Events
&lt;/h3&gt;

&lt;p&gt;Check out these event aggregators:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://10times.com/london-uk/technology/conferences" rel="noopener noreferrer"&gt;https://10times.com/london-uk/technology/conferences&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://infosec-conferences.com/" rel="noopener noreferrer"&gt;https://infosec-conferences.com/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>london</category>
      <category>cybersecurity</category>
      <category>conference</category>
      <category>meetup</category>
    </item>
    <item>
      <title>Google Support and “Legit” Phishing</title>
      <dc:creator>Sam Stepanyan</dc:creator>
      <pubDate>Mon, 18 Jun 2018 19:07:04 +0000</pubDate>
      <link>https://dev.to/securestep9/google-support-and-legit-phishing-415f</link>
      <guid>https://dev.to/securestep9/google-support-and-legit-phishing-415f</guid>
      <description>&lt;p&gt;Has &lt;a href="http://twitter.com/Google"&gt;@Google&lt;/a&gt; gone mad? Legit support page asks to upload a photo of my Government-Issued ID and a photo of my credit card! To Google Cloud?? to “Verify” the Cloud account?? Cybercriminals will be thanking Google for this #phishing gift!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Gi7oIfHc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1024/1%2AL26fWqTd34RxxRWsEocoqA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Gi7oIfHc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/1024/1%2AL26fWqTd34RxxRWsEocoqA.png" alt="" width="800" height="423"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here is the link if you want to try this yourself (real Google Support page, not phishing):&lt;/p&gt;

&lt;p&gt;&lt;a href="https://support.google.com/cloud/contact/verify?cloud_account_id=12A3BC-4DE56F-789GHI&amp;amp;billing_customer_number=1111"&gt;Verify payment information to continue&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Of course the problem with this approach is that we have been teaching users in security awareness courses for two decades now that a legit website will never use such behaviour do that to “verify” he account, that’s what phishing website do…&lt;/p&gt;

</description>
      <category>phishing</category>
    </item>
    <item>
      <title>Firefox freezes on chrome://global/content/bindings/textbox.xml</title>
      <dc:creator>Sam Stepanyan</dc:creator>
      <pubDate>Fri, 16 Mar 2018 12:55:55 +0000</pubDate>
      <link>https://dev.to/securestep9/firefox-freezes-on-chrome-global-content-bindings-textbox-xml-338</link>
      <guid>https://dev.to/securestep9/firefox-freezes-on-chrome-global-content-bindings-textbox-xml-338</guid>
      <description>&lt;p&gt;Got an interesting and unexpected error message today (Mar 16,2018) from Firefox 58 which was running with just the default page — suddenly displayed a popup saying that a script on the following page is running slowly:&lt;/p&gt;

&lt;p&gt;chrome://global/content/bindings/textbox.xml&lt;/p&gt;

&lt;p&gt;I have found some references on Mozilla Developer site, however this does not look good from QA &amp;amp; testing point of view:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://developer.mozilla.org/en-US/docs/Mozilla/About_omni.ja_(formerly_omni.jar)"&gt;https://developer.mozilla.org/en-US/docs/Mozilla/About_omni.ja_(formerly_omni.jar)&lt;/a&gt;&lt;/p&gt;

</description>
      <category>firefox</category>
      <category>javascript</category>
    </item>
    <item>
      <title>How Samsung Phones Secretly Spy On Your Location</title>
      <dc:creator>Sam Stepanyan</dc:creator>
      <pubDate>Thu, 08 Mar 2018 10:09:02 +0000</pubDate>
      <link>https://dev.to/securestep9/how-samsung-phones-secretly-spy-on-your-location-4pdc</link>
      <guid>https://dev.to/securestep9/how-samsung-phones-secretly-spy-on-your-location-4pdc</guid>
      <description>&lt;p&gt;While working on a mobile application security project for a client, I had to investigate all HTTPS calls made by an app using a “man-in-the-middle” technique essentially pushing all traffic from the test Samsung Galaxy S5 smartphone through an intercepting proxy. And I stumbled upon something really strange.&lt;/p&gt;

&lt;p&gt;Every now and then the phone would send a POST request to the following URL:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://ew.disaster-device.ssp.samsung.com/quloc"&gt;https://ew.disaster-device.ssp.samsung.com/quloc&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What was interesting was in the payload. This was not a usual POST request, it contained the following 45-byte string:&lt;/p&gt;

&lt;p&gt;{“lat”:51.5xxxxx,”lon”:-0.1xxxxxx,”dv”:”01"}&lt;/p&gt;

&lt;p&gt;which was the phone’s precise location! I obfuscated the exact digits with xxxx in the above example.&lt;/p&gt;

&lt;p&gt;So, it appears that Samsung phones periodically “call home” and report their location to Samsung. Why this data collection happens? I will continue to investigate, but wanted to publish this information in case if somebody else comes across this mysterious “disaster-device” URL.&lt;/p&gt;

&lt;p&gt;ThreatCrowd shows a bit more information about the target domain and associated subdomains:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.threatcrowd.org/domain.php?domain=ew.disaster-device.ssp.samsung.com"&gt;https://www.threatcrowd.org/domain.php?domain=ew.disaster-device.ssp.samsung.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>mobilesecurity</category>
      <category>samsung</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
