andrisatteka.blogspot.com
Andris Atteka's Blog: April 2015
http://andrisatteka.blogspot.com/2015_04_01_archive.html
Wednesday, April 15, 2015. Google, Microsoft and token leaks. Some stir recently was caused by OAuth open redirector. And even an RFC security addendum. Was created for it. While this was known for quite some time already. It's still good to remind the general public. So here's another known issue - an Open Redirector in OpenID. It works like this - whenever "checkid immediate". Mode is used it redirects without any questions asked. And here's an example in accounts.google.com. Openid.claimed id=http...
natesbox.com
Programming Archives - natesbox.com
http://natesbox.com/blog/category/programming
Automotive / EFI Tuning. Unity 5 c# Reference/Cheet Sheets. September 23, 2015. WordPress Malware hack cleanup. July 13, 2015. A few handy commands to cut to the chase and find the crap spammers/skiddies have added to a WP install:. Find files containing text recursively:. Grep -ri "string to search" . A good use of this is to search for the below. It can return false positives, but finds a function commonly used to obsfucate code:. Grep -ri "base64 decode" . Find recently modified PHP files:. Moment....
natesbox.com
Security Archives - natesbox.com
http://natesbox.com/blog/category/security
Automotive / EFI Tuning. CPanel WHM – Wipe cpHulk Lockouts. September 22, 2015. Iptables -F cphulk & mysql -e "Delete from cphulkd.login track;". Delete from cphulkd.login track;". There is a method to remove specific addresses, but I do not have the commands handy at present, and if I remember correctly it entails connecting to the mysql console, running a query to find the IP in the block table and issuing a drop query. WordPress Malware hack cleanup. July 13, 2015. Grep -ri "string to search" . Diff -...
instahack.me
How to Hack Instagram Password | Insta Hack
https://instahack.me/hack-instagram-password
How to Hack Instagram Password. September 4, 2016. Having Instagram accounts and strong passwords. Accounts of various celebrities getting their Instagrams hacked has become one of the more disturbing news in the present world of entertainment. How to hack an Instagram Accounts. The main weakness, as pointed out by a bug hunter, is the OAuth vulnerabilities. This OAuth vulnerability basically allows the hacker enough access to completely mess up the Instagram of the person in question. Insta Hack 2016-20...
jackbezalel.net
Security | jackbezalel
https://jackbezalel.net/tag/security
IT Professional Reporting from the Trenches. Open Source Security Validation Plug-in [Cool! WhiteSource’s New Selection Tool Helps Developers Choose Better Open Source Components. July 10, 2016. OS X and iOS Unauthorized Cross Application Resource Access (XARA). The iOS sandbox protection mechanism can’t yet block this vulnerability. This becomes very unsettling if you consider your iOS and OSx keychain password store can be exposed as well…. This entry was posted in Security. June 18, 2015. June 11, 2015.
jackbezalel.net
Security | jackbezalel
https://jackbezalel.net/category/security
IT Professional Reporting from the Trenches. Open Source Security Validation Plug-in [Cool! WhiteSource’s New Selection Tool Helps Developers Choose Better Open Source Components. July 10, 2016. OS X and iOS Unauthorized Cross Application Resource Access (XARA). The iOS sandbox protection mechanism can’t yet block this vulnerability. This becomes very unsettling if you consider your iOS and OSx keychain password store can be exposed as well…. This entry was posted in Security. June 18, 2015. June 11, 2015.
smarthealthit.org
Announcements – SMART Health IT
http://smarthealthit.org/category/news-etc/announcements
AMA and SMART Collaborate to Survey Physician Interest in EHR Connected Apps. As part of a broader survey of 1,300 physicians covering digital health tools, the SMART Health IT Project and the American Medical Association collaborated on a set of questions to better understand how providers wish to discover, evaluate and purchase apps that connect with their EHR system. Download the full report at: http:/ www.ama-assn.org/resources/doc/washington/ama-digital-health-report923.pdf. October 5, 2016. A Harva...
andrisatteka.blogspot.com
Andris Atteka's Blog: Google, Microsoft and token leaks
http://andrisatteka.blogspot.com/2015/04/google-microsoft-and-token-leaks.html
Wednesday, April 15, 2015. Google, Microsoft and token leaks. Some stir recently was caused by OAuth open redirector. And even an RFC security addendum. Was created for it. While this was known for quite some time already. It's still good to remind the general public. So here's another known issue - an Open Redirector in OpenID. It works like this - whenever "checkid immediate". Mode is used it redirects without any questions asked. And here's an example in accounts.google.com. Openid.claimed id=http...
SOCIAL ENGAGEMENT