SANS Penetration Testing: Category - Methodology

SANS Penetration Testing:

Using the SSH "Konami Code" (SSH Control Sequences)

By Jeff McJunkin Are you familiar with the Konami code? The one popularized by the Contra video game? Pictured above: Tangentially related to SSH If not, let me fill you in. This code is a sequence of control actions for some video games that'll let you jump forward in the game (some call it a … Continue reading Using the SSH "Konami Code" (SSH Control Sequences)

Post Exploitation Redux Webcast Slides

Last Thursday, John Strand and I delivered a new webcast on post exploitation, covering all kinds of tips and tricks. I focussed on some of the cool stuff you can do with the Windows netsh command, including setting up port pivots, sniffing, and gaining remote access to a target's network configuration. John Strand discussed a … Continue reading Post Exploitation Redux Webcast Slides

EXTRA EXTRA! The New SANS Pen Test Poster

Extra! Extra! Read all about it! This week, many of you will be receiving our brand-spankin' new SANS Pen Test Poster in the mail. Please be on the lookout, because it's got some really cool stuff on attack surfaces, tools, and techniques. It's included in the mailing with the SANS Security West brochure. The poster … Continue reading EXTRA EXTRA! The New SANS Pen Test Poster

How Pen Testers Can Deal with Changes to Android SD Card Permissions

By Lee Neely & Chris Crowley Recent updates to the Android OS have changed the permission model for external storage, and these changes will likely impact the way pen testers assess the actions and corresponding risks associated with applications, both malicious and benign, particularly when analyzing how they interact with external storage. Consider this scenario: … Continue reading How Pen Testers Can Deal with Changes to Android SD Card Permissions

Finding Zero-Day XSS Vulns via Doc Metadata

[Editor's Note: Chris Andre Dale has a nice article for us about cross-site-scripting attacks, and he's found a ton of them in various high-profile platforms on the Internet, especially in sites that display or process images. He even found one in WordPress and responsibly disclosed it, resulting in a fix for the platform released just … Continue reading Finding Zero-Day XSS Vulns via Doc Metadata