GoSecure Blog
Contribute to Open Source with Hacktoberfest at GoSecure!
GoSecure is encouraging everyone to join Hacktoberfest. GoSecure has multiple projects open to external contributions. For this specific event, we have tagged issues that are accessible to newcomers with the official tag [hacktoberfest].
Butor Portal Arbitrary File Download Vulnerability (CVE-2019-13343)
Butor Portal is affected by a Path Traversal vulnerability leading to pre-authentication arbitrary file downloads. Every file that can be read by the local user running the Butor Portal Web service could be exfiltrated by an anonymous attacker.
Drugs, Guns, Fake documents, Hitmen… What I expected and much more!
This is the continuity of my first blog post How I Indexed the Darknet and Pastebin During My First University Internship. The GoSecure Torscraper was developed about 1 year ago. Due to a few issues, the entirety of the project was dockerized to simplify the installation procedure (~4-8 lines instead of 4 pages of documentation) and to automate the whole scraping process.
Fuzzing Closed Source PDF Viewers
This blog post covers typical problems which arise when fuzzing closed source PDF viewers and possible approaches to these problems. Hereby it focuses on both: Input-Minimization and Non-Terminating programs. The approaches were found and implemented as part of my master thesis which I have written at TU Darmstadt, Germany in cooperation with Fraunhofer SIT.
Automating local DTD discovery for XXE exploitation
Last month, we presented at Hack In Paris (France) a XML External Entities (XXE) exploitation workshop. It showcase methods to exploit XXE with numerous obstacles. Today, we present our method to exploit XXEs with a local Document Type Declaration (DTD) file. More specifically, how we built a huge list of reusable DTD files.