Tuesday, December 20, 2011
Microprocessor Security
It seems like nobody is actively looking into microprocessor security, especially the segment on microcode. Anyone has ideas on this?
Wednesday, December 7, 2011
2FA for Singapore Banks
Singapore banks are implementing new 2FA tokens. The new tokens will require users to input some information before it generate some pin. Will this be enough to stop the recent surge of malwares that are attacking the internet banking features of the local banks?
Thursday, December 1, 2011
Syscan '12
CFP for syscan'12 is now open.
The honorarium for the speakers are very attractive.
They can be found here
Syscan CFP
Automated Malware Analysis
We are building a automated malware analysis engine. Anyone interested to try it?
Thursday, February 5, 2009
SQL injection for Beginners
There have been so many writeup on SQL injection in the past few years. It is a well researched topics and attackers are no longer relying on the simple injection with the type
' OR 1=1--
But for the beginners, they will be asking "How do I carry out SQL injections??"
Do not worry, this blog will provide a simple step by step explaination to this.
When a programmer develop a web page, he will need to prepare a SQL query statment to be pass into the database for query execution. This will typically be in the form
str = "Select * from User where username=" + name + "and password = " + pass
The parameter name and pass are usually being passed from the webpage. If this statment return a positive result, the user will be authenticated. If it return a null, the user most likely do not exist.
Now, what happen if you pass ' OR 1=1;-- into the name parameter?
The query string will be
Select * from User where username=' OR 1=1-- and password=pass
What this statment means is that username will be blank or always true, as 1 always equal to 1. The -- at the back is the SQL comment sequence. This means that any sentence after this to the end of the line will be ignore by SQL. Therefore, it does not really matter what you pass into the password field as this statement will always return true. The attacker will be authenticated and be allowed into the web application.
Stay tune for part 2 on more advance form of SQL injection.
Tuesday, August 26, 2008
Diving into the world of Tcl/Tk
Trying to pick up GUI programming for Tcl/Tk to add in my work.
Here is a quick reference
http://www.pythonware.com/library/tkinter/introduction/
Here is a quick reference
http://www.pythonware.com/library/tkinter/introduction/
Thursday, August 14, 2008
Web Security
I am starting into the new area of web security and here are some of the resources that I have found. Stay tune for more interesting site on web security
Burp Suite
WebScarab
ProxyStrike
W3af
IBM Rational AppScan
Burp Suite
WebScarab
ProxyStrike
W3af
IBM Rational AppScan
Subscribe to:
Comments (Atom)