3 min
Penetration Testing
Pentesting in the Real World: Capturing Credentials on an Internal Network
This is the second in a series of blog topics by penetration testers, for penetration testers, highlighting some of the advanced pentesting techniques they'll be teaching in our new Network Assault and Application Assault certifications
10 min
IT Ops
Introduction to the Logentries Command Line Interface
The Logentries Command Line Interface (CLI) allows you to both manage and use
your Logentries service right from the command line. The CLI is built on the
Logentries REST APIs and provides a
tool to interact directly with the Logentries service outside of the UI. It is
in beta and currently supports retrieving log events, and performing queries and
calculations on log events using our powerful querying language LEQL
8 min
Vulnerability Disclosure
R7-2016-10: Multiple OSRAM SYLVANIA Osram Lightify Vulnerabilities (CVE-2016-5051 through 5059)
Nine issues affecting the Home or Pro versions of Osram LIGHTIFY were
discovered, with the practical exploitation effects ranging from the accidental
disclosure of sensitive network configuration information, to persistent
cross-site scripting (XSS) on the web management console, to operational command
execution on the devices themselves without authentication. The issues are
designated in the table below. At the time of this disclosure's publication, the
vendor has indicated that all but the la
5 min
Metasploit
Pentesting in the Real World: Gathering the Right Intel
This is the first in a series of blog topics by penetration testers, for
penetration testers, highlighting some of the advanced pentesting techniques
they'll be teaching in our new Network Assault and Application Assault
certifications, opening for registration this week. For more information, check
out the training page at
www.rapid7.com/services/training-certification/penetration-testing-training.jsp
So
4 min
IT Ops
Using Logentries With Angular v1.5
The post assumes at least a basic knowledge of Angular. Angular is a very
opinionated framework so make sure you have some experience with Angular before
following the instructions presented below.
Logentries can integrate into whatever Javascript framework you want to use.
Previously, we examined adding Logentries to a React application
. This post
will illustrate how to add Logentries to your Angular v1 application using
2 min
Komand
How to Build a Powerful Cybersecurity Arsenal with Free & Open Source Tools
Whether you're creating a security program on a budget or building a security
operations center with cost-effectiveness in mind, we believe having the right
people, processes, and tools—in that order—is essential to an effective security
posture.
We’ve talked before about finding the right people andassembling your security
team first
is a smart move. Today, we want to talk about the “tools” part of the equation
7 min
Komand
Making Bug Reporting Easier with AWS S3 and AWS Lambda
Getting users to submit bug reports can take time, energy, and thus requires a
strong desire for the consumer to act upon. For developers, it means that it may
take more time to be notified of a bug. Not everyone is a power user who will
report odd things, especially those that are not mission critical.
Here at Komand, we came up with a neat little solution to make reporting bugs
easier for our users. To do this we must take some of the work out of the
reports. Tasks such as bug notifications (
4 min
IT Ops
REST API: a little cURL and some Python
Here at Logentries
work has been going for sometime in bringing to our customers a powerful and
flexible REST API service for interaction with
their log data. This work started out with the REST Query API
8 min
Komand
Quick security wins in Golang (Part 1)
We all know security is hard. Let’s walk through some basic security principles
you can use to get your Golang web application up and running securely. If you
just want to see the code check out the application on Github: Golang Secure
Example Application (gosea) .
Recently, I gave a lightning talk on using Golang middleware to implement some
basic security controls at the Boston Golang Meetup
. This post will i
3 min
IT Ops
Backup Log Checks and What They Can Tell You
There is simply no substitute for a recent, accurate backup when it comes to
recovering from file or system damage or outages. But that backup must be
complete and error-free to make a full recovery possible. That’s why inspecting
log files from backups is a critical and important step in verifying their
accuracy or coverage, and a necessary check before performing a restore that
converts any backup image or files into production status.
Your backup logs
2 min
Vulnerability Disclosure
R7-2016-08: Seeking Alpha Mobile App Unencrypted Sensitive Information Disclosure
Due to a lack of encryption in communication with the associated web services,
the Seeking Alpha mobile application for Android and
iPhone leaks personally identifiable and confidential information, including the
username and password to the associated account, lists of user-selected stock
ticker symbols and associated positions, and HTTP cookies.
Credit
Discovered by Derek Abdine (@dabdine ) of Rapid7,
Inc., and disclosed in accordance wit
2 min
Nexpose
Patch Tuesday, July 2016
July
continues an on-going trend with Microsoft's products where the majority of
bulletins (6) address remote code execution (RCE) followed by information
disclosure (2), security feature bypass (2) and elevation of privilege (1). All
of this month's 'critical' bulletins are remote code execution vulnerabilities,
affecting a variety of products and platforms including Edge, Internet Explorer,
Microsoft Office, Office Services
4 min
Komand
A Guide to Defending Pokemon Go Gyms: Lessons from Cybersecurity
You’ve probably heard of this Pokemon Go thing. We recently featured the game in
our latest newsletter, and have since been running around like PokeManiacs
trying to catch ‘em all. While discussing our Komand group strategy (Yes, we’re
playing as a team 😅), we couldn’t help but notice parallels between Pokemon Go
and cybersecurity. In particular, we see strong correlations between gym defense
and cyberdefense.
For those that aren’t privvy, the goal of Pokemon Go is to collect and train as
many
5 min
IT Ops
Keep Your Code Clean while Logging
In my consultancy practice, one of the things that I do most frequently is help
teams write so-called “clean code.” Usually, this orients around test-driven
development (TDD) and writing code that is easily maintained via regression
tests and risk-free refactoring. Teams want to understand how to do this, and
how to do it in their production code (as opposed to in some kind of toy “let’s
build a calculator” exercise).
One of the most prominent, early sticking points that rears its head tend
9 min
Komand
Local Cybersecurity Meetups Near You
Here at Komand, we understand the importance of being part of a community
. Not everyone can
can afford the cost or time commitment necessary to attend large conferences.
But that shouldn’t stop you from staying current, connected and active with the
security community. Think local meetups: easy access, inexpensive, and in a
relaxing environment with familiar faces.
Recently, we featured US Cybersecurity Conferences