• Epic Holiday Cookie Baking

    Jim Allee, Senior Consultant, Coalfire

    One aspect of being a penetration tester that is always rewarding is the process of rabbit-holing into an area of interest and letting the data guide me to my destination. Recently, while updating and testing new code on a custom cookie fuzzing tool (Anomalous Cookie – https://github.com/Coalfire-Research/AnomalousCookie.git/), I discovered a XSS (cross-site scripting) vulnerability on EpicGames.com. While it appeared possible to write a good payload (stealing cookies and injecting malicious JavaScript/BeEF hooking), I had no good way to deliver it. Traditional cookie-stuffing (https://en.wikipedia.org/wiki/Cookie_stuffing) might work to drop the rogue cookie onto a target’s machine; but could there be other ways? If not, this would most certainly be classified as 'Self-XSS.'

    Read more
  • PCI Announces Coming Qualified PIN Assessor (QPA) Program

    Sam Pfanstiel, Senior Consultant, P2PE, Coalfire

    Second only to protecting sensitive credit card account information, safeguarding the cardholder’s personal identification number (PIN) is one of the most important tasks for prevention of card-present fraud in retail and banking. With the continued movement toward chip-and-PIN EMV (the technology standard named for Europay, Mastercard, and Visa), it is even more crucial that entities handling PINs protect this information properly in the face of continually evolving threats.

    Read more
  • What You Should Know About the Changing Nature of Telephone-Based Payments

    Karl Steinkamp, Director, PCI Product and Quality Assurance

    In March 2011, the PCI SSC released the initial version of the “Protecting Telephone-Based Payments Card Data” Information Supplement as a guide to help assessors assess environments where cardholder data was stored, processed, and/or transmitted over the telephone. It was a pivotal guidance document at the time that set the stage for a broader focus on telephony technologies. As of November 2018, that time has finally arrived. The revised document provides a comprehensive dive into various telephony architectures (specifically VoIP, ISDN, and PSTN) and related people and processes that are required to be considered within scope for PCI DSS compliance.

    Read more
  • Kubernetes Vulnerability: What You Can and Should Do to Protect Your Enterprise

    Nathan DeMuth, Senior Manager, Cyber Engineering, Coalfire

    This week, news was released regarding a critical security Common Vulnerability and Exposure (CVE) associated with the Kubernetes container software (CVE-2018-1002105). While this is only a reported vulnerability at this stage (and no actual exploits have been reported to date), organizations that have Kubernetes deployed within their environment(s) are strongly advised to treat this matter with high priority.

    Read more
Top