Code Fortification

Code Fortification

Password Hashing and Encryption The following list includes mitigation strategies you will want to present to your clients concerning secure password storage and transmission: Multi-Factor Authentication Just a few years ago, the cost of implementing multi-factor authentication could be quite high. More recently, it has become very affordable, costing as little as $10 USD per […]

Pen Test Reporting

Suggested Solutions

Regarding People A pen test team needs to recommend mitigation solutions for people, processes, and technology to deal with any discovered vulnerabilities. These all need to be considered together so that your recommendations don’t result in gaps. All three of these factors often overlap, so hardening one without hardening the others will still result in […]

Pen Test Reporting

Pen Test Data

Collection As you conduct your penetration testing, you will be gathering a great deal of highly sensitive information. You need to ensure that the data is properly handled so that this sensitive information does not fall into the wrong hands. The addresses, network maps, security details, and the vulnerabilities of these and other factors would […]

Anti-Forensic Techniques

Anti-Forensic

Forensics is the branch of computer science that seeks to discover evidence of activity in computers, digital storage media, and networks. Most hacking activities and tools leave direct or indirect evidence that can be discovered by a forensic investigator. The following table summarizes some popular cyber forensics tools. Forensics Tool Description EnCase Multi-forensic platform that […]

Code Fortification

Code Review

Insecure Coding Practices Most of the previous exploits are made possible due to poor coding practices during development. You should attempt to leverage these mistakes whenever you can. The following are examples of insecure coding practices. Note that these apply to most types of software, not just web apps: Reverse Engineering Reverse engineering, as applied […]

Attack Hacking 101

Hardware Attacks

There are some attacks that you can use to test the physical security of the target’s hosts, rather than testing them from a purely virtual space. Note that these tests are technical in nature, and usually involve vulnerabilities in how the host’s hardware is configured. Also, these attacks are not OS-specific—because they are hardware-based, they […]