From: Slashdot – How Red Teams Hack Your Site To Save It

Posted on 2012/11/13


a quick re-post from Slashdot http://it.slashdot.org/story/12/11/12/1639240/how-red-teams-hack-your-site-to-save-it?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+slashdot%2FeqWf+%28Slashdot%3A+Slashdot%29

How Red Teams Hack Your Site To Save It by samzenpus
Nerval’s Lobster writes “The use of a Red Team and penetration testing can strengthen an organization’s security posture. But how does a Red Team member actually think like an attacker, and use that mindset to exploit security vulnerabilities? Gillis Jones works for WhiteHat Security, where his job rests within the TRC (Threat Research Center). It’s here that he performs hands-on site assessments, which involve manually confirming all the issues reported by an automatic scan of a particular Website or application. His job includes checking the application’s POST and GET requests for reflection of any inputs. He also checks for Cross-Site Scripting (XSS), which includes stored, reflected, and DOM XSS vulnerabilities. Those checks let him determine the Website’s basic security posture. If user input isn’t encoded or sanitized, that’s a good indicator of other problems. And if that’s the case, then Jones (or someone like him) will move on to checking for SQL Injection (SQLi) vulnerabilities and other issues.”


Share on Google+

Read more of this story at Slashdot.

Posted in: reading