Pen testing is a well-established practice for many organizations. With such diverse environments consisting of different applications from different vendors, it’s safe to assume security weaknesses are lurking somewhere. But why aren’t these security flaws found earlier, by the creators themselves? In this blog, we’ll explore why applications should also go through security testing and review during the development stage.
1. Advisory Information
Title: Cisco AnyConnect Posture (HostScan) Security Service Multiple Vulnerabilities
Advisory ID: CORE-2021-0001
Advisory URL: https://www.coresecurity.com/core-labs/advisories/cisco-anyconnect-posture-hostscan-security-service-local-privilege-escalation (Retired)
Date published: 2021-02-17
Date of last update: 2020-02-17
The global chaos of last year was also seen in the digital world, as cyber attackers were seemingly relentless in their efforts. Such activity underscores the importance of penetration testing to assess and test security vulnerabilities, which allow you to better evaluate risk and be ready to detect, prevent and respond to threats as they happen.
Authored by: Julio Sanchez
As a new year looms bright with possibility in front of us, how can we prepare for a world that looks profoundly different than it did a year ago? On the cybersecurity front, we can always anticipate continuing battles with familiar foes, as well as a few new challenges on the horizon. Though we may not have a crystal ball, based on our observations and discussions, here are six predictions for the upcoming year.
Authored by: Ramiro Molina
In part 5, we completed our analysis of Stack4 using IDA Free. In this next part, we’ll be solving ABO1, using RADARE.
The first thing we need to do is to find the binary information located in ABO1_VS_2017.exe. Go to the folder where the executable is and extract it using rabin2.
Using RABIN2
rabin2 -l ABO1_VS_2017.exe
When someone says “pen test,” you’re not alone if you pictured someone clicking a ball point pen top, drawing scribbles to see if any ink comes out. But if you keep listening, it actually seems like pen testers are paid to hack into computers all day long. So what do they actually do? We went behind the scenes, taking a closer look at the day in the life of a pen tester.
Authored by: Julio Sanchez
2020 has been a chaotic year. From the far-reaching impact of COVID-19 to the increasing number of data breaches across nearly every sector, the threat landscape continues to intensify and the importance of cybersecurity continues to grow.
Pagination
- Previous page
- Page 9
- Next page