The Coalfire Labs Blog

Welcome to the Coalfire Labs Blog, a resource covering the most important issues in IT security and compliance.  The Coalfire Labs blog is written by the company's leadership team and our highly-credentialed security assessment experts.


  • Exploiting an Unsecured Dell Foglight Server

    May 23, 2018, Esteban Rodriguez, Consultant, Coalfire Labs, Coalfire

    Dell Foglight for Virtualization is an infrastructure performance monitoring tool that can also be used to manage systems as well. It comes configured with a default username and password of “foglight.”

  • Pro Tip: The Right Way to Test JSON Parameters with Burp

    May 21, 2018, Dan McInerney, Senior Security Consultant, Coalfire

    Here’s a Burp trick you might not know, which helped find this instance of command execution and lots of SQL injection in other applications. Despite PortSwigger claiming otherwise, Burp does not parse JSON very well, especially nested JSON parameters and values like you see below.

  • Microsoft Word Document Upload to Stored XSS: A Case Study

    May 09, 2018, Esteban Rodriguez, Consultant, Coalfire Labs, Coalfire

    Anytime I see a file upload form during an application test, my attention is piqued. In a best-case scenario, I can upload a reverse shell in a scripting language available on the webserver. If the application is running in PHP or ASP for example, it becomes quite easy. If I can’t get a backdoor uploaded, I will attempt to try to upload an HTML page to get my own client-side javascript uploaded for XSS attacks.

  • Cooking Up Shells with Chef

    April 30, 2018, Ryan Wendel, Consultant, Coalfire Labs

    I was able to compromise a Chef server on one of my recent engagements. Owning a Chef server means having the keys to the castle. I wasn’t quite sure how to go about using this tool. I’m familiar with Puppet as I’ve spent the majority of my career on the systems side. Having never run into Chef, I needed to put a little time into figuring out the fastest way to use a Chef infrastructure to shell a bunch of sensitive hosts. Here is how I went about it.

  • Sleuthing the Cloud: The Challenges of Forensics in Cloud Environments

    April 04, 2018, Robert Meekins, Director, Forensics, Coalfire

    More and more companies are embracing Cloud computing for the practicality, efficiency, and economy of outsourcing the housing, maintenance, and monitoring of applications and their associated infrastructure to a third-party provider. As the Cloud becomes more the norm than the exception, there is no lack of choices: Providers such as Amazon (AWS), Microsoft, IBM, and countless others are providing a variety of solutions, from e-commerce sites that process payments and credit cards, to developmental networks used to test and configure operational assets.

  • Displaying results 1-5 (of 58)
     |<  < 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|