Tag: owasp

Understanding OWASP A09 2021 Security Logging and Monitoring Failures
Security

Understanding OWASP A09 2021 Security Logging and Monitoring Failures

Understanding OWASP A09 2021 Security Logging and Monitoring Failures' serves as a beacon, shedding light on a pivotal aspect of digital security. Strong security recording and monitoring procedures are crucial in a time when cyber threats are prevalent and businesses are struggling to protect their most valuable assets. As a sentinel, OWASP A09 draws attention to the flaws in insufficient logging and monitoring systems and emphasizes the need of preventative mitigation techniques. We delve into the nuances of security logging and monitoring failures, analyzing their ramifications and mapping out a path towards improved resilience in the face of dynamic cyber attacks as we explore OWASP A09 2021. Understanding OWASP A09: Security Logging and Monitoring Failures The failure to ap...
Understanding OWASP A04:2021 – Insecure Design: Risks, Implications, and Solutions
Security

Understanding OWASP A04:2021 – Insecure Design: Risks, Implications, and Solutions

Vulnerabilities in cybersecurity frequently originate from design flaws rather than simple code faults and are hidden beneath the surface. The widely recognized "Insecure Design," or OWASP A04:2021, acts as a vital lighthouse, highlighting these fundamental flaws in digital systems, this article dives deeply into Understanding OWASP A04:2021 - Insecure Design: Risks, Implications and practical mitigation techniques. Let's explore the complex world of unsecured design flaws and how businesses may protect their digital assets by navigating these dangerous waters. Exploring OWASP A04:2021 - Unveiling the Essence of Insecure Design OWASP A04:2021, also referred to as "Insecure Design," is a cybersecurity standard that highlights vulnerabilities resulting from poor architectural...
Understanding OWASP Top 10: A Comprehensive Guide to Web Application Security
Security

Understanding OWASP Top 10: A Comprehensive Guide to Web Application Security

In the current digital era, web application security is essential for protecting sensitive data. As technology develops, so do the strategies and tactics used by bad actors to take advantage of holes in web applications. One of the most important organizations for spreading knowledge and offering recommendations on web application security is the Open Web Application Security Project (OWASP). The OWASP Top 10, which is a list of the most important web application security threats, is among their most noteworthy contributions. In this blog post we will delve into the OWASP Top 10 Web Application Security Vulnerabilities, exploring each security risk in detail and understanding the implications for web developers, security professionals, and businesses. What is the Open Web Appl...
Business

Nmap – Port Scanner

Overview Nmap is a popular tool used by both beginners and professional penetration testers for information gathering. Nmap is mainly used as a port scanner, finding open and closed ports and what services are running on them. But Nmap also has many scanning features such as identifying the geolocation of the device, scanning for vulnerabilities (like SSL Heartbleed) and more. Nmap Cheat sheet (Most relevant port scanning commands) -O (OS detection) –sV (returns the version of the applications/service running on the port) -sT (TCP connect port scan, full three-way handshake scan) -p <port number/range> (allows specifying ports to scan) -n (do not resolve the domain name) -sn (Disable port scanning) -sP (ping the hosts only) -f (Request with fragmen...
Business

Nessus – Free Security Scanner

Overview Nessus is a proprietary vulnerability scanner developed by Tenable. It is a free security scanner that can assess the modern attack surface and find vulnerabilities. It also uses the CVE architecture for easy cross-linking between compliant security tools. Nessus has multiple scanning options such as: Hosts discovery Basic network scan  Web application scan Advance Scan Malware Scan etc In this article, we will discuss how to install and use Nessus. We will also discuss its configurations and automation abilities. Nessus Installation (Kali Linux) Nessus is compatible with Linux and Windows Operating systems. This installation guide will be done on a Kali Linux machine. To use Nessus, you need an activation code. This can be acqu...
Business

DNS Blacklists – Block Spam and Malicious Entities

Overview DNS blacklists are a database that holds a list of IP address or URLs of spam emails and malicious websites and more. They are used to filter out spam and malicious websites from reaching end users. For example, they are usually used by ISPs or mail servers to prevent spam from getting to their users. There are hundreds of DNS blacklists that exist and spam is only one type of DNS blacklist. There are many types of DNS blacklists such as: Spam Image Spam Malware/Virus Phishing Botnet Compromised Machines Bogon etc Some DNS blacklists are even country-based. In this article, we will discuss how to use DNS blacklists and how they can improve the security of your network. Type of DNSblacklists How to use a DNS Blacklist To check if th...
Business

Nikto – Web Application Vulnerability Scanner

Overview Nikto is an open-source command-line web application vulnerability scanner that scans for 6700 potentially dangerous files/programs. It also looks for misconfigurations, checks for outdated versions of over 1250 servers, and find version-specific problems on over 270 servers. Nikto is a loud tool so it will get logged and flagged by IDS/IPS. Note that not every "problem" found is a security issue. You will need to confirm the vulnerability manually. Nikto has features such as: Easily updatable CSV-format checks database Output reports in plain text or HTML Available HTTP versions automatic switching Generic as well as specific server software checks SSL support (through libnet-ssleay-perl) Proxy support (with authentication) Cookies support Nik...
WhatWeb – Website Technology Identifier
Business

WhatWeb – Website Technology Identifier

Overview WhatWeb is an open-source reconnaissance tool capable of identifying the technology of a website. It recognises web technologies including content management systems (CMS), JavaScript libraries, web servers, statistic/analytics packages, blogging platforms and more. It has over a thousand plugins to recognise software versions, frameworks, email addresses, errors and etc. WhatWeb not only identifies the technology found but also describes it, which is great as not everyone understands the technology identified. Here is the list of features WhatWeb contains: Over 1700 plugins Control the trade-off between speed/stealth and reliability Plugins include example URLs Performance tuning. Control how many websites to scan concurrently. Multiple log formats: Br...
Business

DNSenum – DNS Information Gathering

Overview Dnsenum is an open-source DNS information gathering tool to find DNS information of a domain and discover non-contiguous IP blocks. Its main purpose is to gather as much information as possible about a domain. DNSenum is scripted in Perl that also supports multithreading to speed up the scans. Its features are: Get the host’s addresses (A record). Get the name servers (threaded). Get the MX record (threaded). Perform axfr queries on nameservers and get BIND versions(threaded). Get extra names and subdomains via google scraping (google query = “allinurl: -www site:domain”). Brute force subdomains from a file. can also perform recursion on subdomains that have NS records (all threaded). Calculate C class domain network ranges and perform whois querie...
Business

Whois – Server Reconnaissance

Overview WHOIS (RFC 3912) protocol is a query and response protocol. The Whois tool is used to establish this protocol and intelligently choose the appropriate whois server and query its database. The information gathered from this database is information such as contact details for domains, IP Addresses and Admin assignments. How to use Whois The command format to use whois is whois <Domain/URL> This simple command gives a lot of information about the domain such as: Creation Date Updated Date Registry Registrant (details) Name Server DNSSEC Admin (details) etc These are useful information that can help you get a better picture of your target. We can also see that whois gathers this information instantly. Conclusion W...