Cyberis Blog
Reassuringly clear thinking.
- Cloud risk management
- Cyber Essentials
- Penetration testing
- Remote working
- Tools and techniques
Defining controls by expectation may result in exploitation
One of the significant factors influencing SMEs when selecting security controls is not pragmatic risk management and risk treatment, or even common industry frameworks, as you might imagine - but security controls expected by customers. Supply-chain security management through due diligence activities is often reasonable for this approach, but the one-size-fits-all approach can lead to weaker security models.
- Penetration testing
- Red teaming
Dead canaries in your network
When an adversary is inside your network, the faster you can detect and remove the intrusion the better. Even if you don't have a "network" per se – even if you are running a pure zero-trust environment – detecting an attacker at work early will give you the upper hand. Even with sophisticated EDR products in the mix, criminals can often introduce malware to an environment to gain a foothold in a way that isn't detected. Introduction of malware and establishment of a foothold is critical to criminal operations and so today's criminal gangs spend a great deal of time and resources using tradecraft and techniques to bypass the detective and preventative controls running on user workstations. Even with a really good set of tools in the hands of an experienced defence teams, there is a good chance of criminals starting their attack chain without being caught. Using canaries can help you stay ahead.
- Penetration testing
- Tools and techniques
XSS is more than just <script>
Recently, we were examining an application that was protected by Cloudflare. We found a code injection point in a search field parameter where it was possible to introduce data of our choosing which looked like a good candidate for reflected cross-site scripting. With the protection afforded by control layers in place, however, demonstrating a credible proof-of-concept meant using alternative methods.
- Penetration testing
- Tools and techniques
Sticky Keys - classic EUD device privilege escalation
Sticky Keys is an accessibility feature within Windows that assists users who have physical disabilities. Instead of having to press multiple keys at once, you can use one key by turning on Sticky Keys and adjusting the settings. However, the feature can be manipulated to elevate your local privileges. Now this technique is not new and has been around since the days of Windows XP but is still relevant if you have physical access to a device.
- Penetration testing
The password is dead. Long live the password...
Passwords are bad. We've known passwords are bad for decades, but the truth is that they're unlikely to go away for a very long time, even though we know all about their flaws.
- Penetration testing
Cyber security challenges facing schools
We all want our schools and educational institutions to be secure. We all want to ensure that our children can learn and thrive in a safe environment, and that we keep their data protected from those who might misuse it. Schools are under attack, though – almost constantly – from increasingly organised and sophisticated criminal gangs.
- Penetration testing
Application testing and the OWASP Top 10
Quite often, a customer will ask us to "test our application against the OWASP Top 10". I'm going to start by saying that the OWASP Top 10 is a wonderful tool which has helped improve web application security globally since it first launched. But although it’s a common request to test applications against it, I think it's helpful to explain why it might not give you the security outcomes you want from a web application penetration test.
- Penetration testing
Accounting for key business security concerns in penetration testing
When it comes to penetration testing, if you have a good idea what you are really worried about as a business, you can get better results. The more we know about you, your business and your security concerns when we conduct your pentest, the more focussed and accurate our risk ratings can be, and the more tailored to your environment our advice can be.
Improve your security
Our experienced team will identify and address your most critical information security concerns.