Securing SuiteCRM on Apache

SuiteCRM is a popular open-source Client Relations Manager (CRM). I took some time to review the code and basic implementation of the application within a vanilla Ubuntu Debian build. I found good security practices within the application itself, however, it seemed that the majority of configuration guides available would ultimately lead to security concerns in Securing SuiteCRM on Apache

PHP Type Juggling

Type juggling is an expected functionality of PHP when leveraging loose comparisons. However, it can be used to subvert intended operations. In this blog, we will discuss why type juggling occurs, what are the potential impacts, and why we should use strict comparisons when developing applications in PHP. Equal vs Identical In PHP, there is PHP Type Juggling

Defining the Secure Software Development Lifecycle (SSDLC)

Defining the Secure Software Development Lifecycle (SSDLC)

Here at Abricto Security, we believe that application penetration tests only reveal the tip of the iceberg. Specifically, if we conduct an application penetration test and we find that it’s riddled with vulnerabilities, the remediation effort shouldn’t stop once those vulnerabilities are patched and the application gets shipped. Instead, we believe the mantra that “security Defining the Secure Software Development Lifecycle (SSDLC)

Our Response to COVID-19

COVID-19

Abricto Security understands that all industries feel the impact of COVID-19 and we’re here to help. Our team is shifting our operating procedures to accommodate fully remote consultations and assessments. Here is how we plan to do so: We will host virtual meetings for presales, kick-offs, status updates, and debrief calls We will provide pre-configured Our Response to COVID-19

SQLmap Cheatsheet and Examples

SQLmap

Target the http://target.server.com URL using the “-u” flag: sqlmap -u ‘http://target.server.com’ Specify POST requests by specifying the “–data” flag: sqlmap -u ‘http://target.server.com’ –data=’param1=blah&param2=blah’ Target a vulnerable parameter in an authenticated session by specifying cookies using the “–cookie” flag: sqlmap -u ‘http://target.server.com’ –cookie=’JSESSIONID=09h76qoWC559GH1K7DSQHx’ Drop all Set-Cookie requests from the target web server using the “–drop-set-cookie” flag: sqlmap -u ‘http://target.server.com’ SQLmap Cheatsheet and Examples

Extracting Private Keys From Public Keys Generated With Weak Random Number Generators

Extracting Private Keys

Public key encryption is heavily utilized in modern implementations of SSH. By leveraging public key cryptography, administrators can generate both a public key and a private key to encrypt and decrypt data in transit. Using this method is favored over logging in with passwords that are vulnerable to dictionary attacks. Unfortunately, many SSH implementations use Extracting Private Keys From Public Keys Generated With Weak Random Number Generators

Password List Generation Using CUPP

Password List Generation

In many of our network and web application penetration tests, we come across login portals that aren’t protected by anti-automation controls. Essentially, this allows us to launch unrestricted dictionary attacks on previously identified usernames. When faced with this scenario, many attackers will immediately turn to their ‘Top 500 Passwords’ list in hope of quick wins. Password List Generation Using CUPP