Bypassing AES encryption if the keys are not in local,but in server

When I conduct a mobile pentest, I have run into payload encryption in HTTP traffic. In general, the AES key and IV ( initialization vector) are located in APK, and can be used to encrypt the payload using Burp suite extensions such as AES… Continue reading Bypassing AES encryption if the keys are not in local,but in server

In case of multiple websites using a single IP, and we have been asked to perform vulnerability assessment to ensure its security, how many to target

When doing black-box vulnerability assessment (with permission of course) of a subdomain of a website, the first step is enumeration; and the first step of that is finding IP of the subdomain.
If you find this IP, and then upon performing … Continue reading In case of multiple websites using a single IP, and we have been asked to perform vulnerability assessment to ensure its security, how many to target

Data integrity protection in Drupal 10.x – how lock conditions might fail

I was doing some pentesting on a Drupal 10.x application that some colleagues built; I have not reviewed the source code. The dynamic vulnerability scanner I use provoked some exceptions related to a failure to obtain locks on various obje… Continue reading Data integrity protection in Drupal 10.x – how lock conditions might fail

How to Approach CVEs Marked as "DISPUTED" and "WON’T FIX" in PCI-DSS Pentest

When conducting penetration testing in a PCI-DSS compliance context, we found a known security vulnerability that’s identified by a CVE number.
In this case, the finding in question is CVE-2016-20012, which is marked on the CVE database as… Continue reading How to Approach CVEs Marked as "DISPUTED" and "WON’T FIX" in PCI-DSS Pentest