Mastodon

Introducing paste searches and monitoring for “Have I been pwned?”

I’ve got 174,451,409 breached accounts in Have I been pwned? [https://haveibeenpwned.com/] (HIBP) as of today which probably sounds like a lot, but it’s not. Why is it not a lot? Because whilst that list spans a lot of the big breaches I could get my hands on, as of the middle of this year (now a couple of months ago already), there were over half a billion accounts breached in just six months [https://www.riskbasedsecurity.com/2014/08/hacking-exposed-78-of-all-records-compromised-in-first-half-...

10 things I learned about rapidly scaling websites with Azure

These real world experiences with Azure are now available in the Pluralsight course "Modernizing Your Websites with Azure Platform as a Service" [http://www.pluralsight.com/courses/modernizing-websites-microsoft-azure]This is the traffic pattern that cloud pundits the world over sell the value proposition of elastic scale on: This is Have I been pwned? [https://haveibeenpwned.com] (HIBP) going from a fairly constant ~100 sessions an hour to… 12,000 an hour. Almost immediately. This is what h...

Solving the tyranny of HTTP 403 responses to directory browsing in ASP.NET

You may not know this, but an HTTP 403 response when browsing to an empty directory is a serious security risk. What the?! You mean if I go to my website which has a “scripts” folder where I put all my JavaScript and I have directory browsing disabled (as I rightly should) and the server returns a 403 “Forbidden” (which it rightly should), I’m putting my internet things at risks of being pwned?! Yes, because it discloses the presence of a folder called “scripts” which is a common directory. W...

What the f*** were they thinking?! Crazy website biases exposed by naughty words lists (the NSFW version)

I’ve long held the view that passwords should consist of as many crazy things as the owner deems fit. If I want to create a password that looks like a dog just ate the keyboard and threw up all the keys, then good for me. (Chances are that Fido is going to cough up a pretty unique password too but before PETA gets on my case, try using a password manager like 1Password [https://www.troyhunt.com/2011/03/only-secure-password-is-one-you-cant.html] instead.) Now I’m used to seeing all sorts of ridi...

Hack Your API First – learn how to identify vulnerabilities in today’s internet connected devices with Pluralsight

A few years ago I was taking a look at the inner workings of some mobile apps on my phone. I wanted to see what sort of data they were sending around and as it turned out, some of it was just not the sort of data that should ever be traversing the interwebs in the way it was. In particular, the Westfield iPhone app to find your car caught my eye [https://www.troyhunt.com/2011/09/find-my-car-find-your-car-find.html]. A matter of minutes later I had thousands of numberplates for the vehicles in th...

Automating web security reviews with Netsparker

I will not run web security analysers without first understanding web security. I will not run web security analysers without first understanding web security. I will not run web security analysers without first understanding web security. Are we clear now? Good, because as neat as tools like I’m about to discuss are, nothing good comes from putting them in the hands of people who can’t properly interpret the results and grasp the concepts of what dynamic analysis scanners can and cannot cover....

Security Insanity with RunAs Radio

I know I’ve shared this a number of times now, but no matter how much I see it, it still cracks me up: [https://www.troyhunt.com/2012/07/lessons-in-website-security-anti.html] Make sense? Of course it doesn’t and therein lies the insanity of it all! But let us not single out Tesco alone, there are plenty of British companies that construct responses like this (sorry English people, I don’t know why, they just seem to feature disproportionately to the rest of the world). In fact earlier this w...

InfoSec Insanity: Sharing the crazy for the betterment of online security

I was getting a little fed up with the craziness I kept seeing on the web when it comes to security, so I created this: [http://lh3.ggpht.com/-nAoaSvA-cZE/U_r33Cj89lI/AAAAAAAAHAc/TYQYwW3Kz_Q/s1600-h/Logo24.png] That’s right, a great big freakin’ padlock with a straightjacket or more to the point, I created the Twitter account @InfoSecInsanity [https://twitter.com/InfoSecInsanity]. So what exactly is InfoSec Insanity? We’ll let’s take this example from the weekend on restricting passwords wh...

Hello World, this is Troy

How did you get started in this industry? I mean what made you go “Hey, sitting it a keyboard day in day out whilst focussed on screens and not seeing much sunlight sounds awesom…” – wait, it doesn’t sound quite so awesome when you think of it like that. In fact that was my original view of computers in general but as I told Shawn Wildermuth on his latest Hello World podcast [http://wildermuth.com/hwpod/36_Troy_Hunt], that view of the world soon changed. The change of heart was more than helped...

Migrating from Subversion to Git with svn2git on Windows (the tricky bits explained)

This is one of those “I keep doing this and it hurts each time and there’s never a good concise resource that explains it well so I’m writing one” posts. Yes, yes, I know it’s easy – if you have Ruby installed. Or you’re living in a *nix world. Or you have a reasonable understanding of Git. Or you get pleasure from pain. However, if you’re living on Windows and you just want to get the damn thing done, it can be painful. I keep setting up new machines and having to remember how to do this from...