I remember a time not so long ago where good web application security
content was extremely rare and difficult to come by. These days it seems
every week something new is posted that's worth taking the time to read.
It's hard to keep up with all of it and analyzing the details, so I'll
post what I can.

1) Dancho Danchev is masterful at noticing and analyzing what nefarious bag
guys are up to, especially in the web security environment. In his most
recent post, Stealing
<http://ddanchev.blogspot.com/2008/05/stealing-sensitive-databases-online-sq
l.html>  Sensitive Databases Online - the SQL Style, he talks about
economies of scale in the recent massive SQL injection hacks. Essentially he
asks rather opening if these massive attacks are attempts to pull smaller
data sources together or generally just leverage them as a mass platform for
attack. Good question, could go either way in my opinion.

2) C. Warren Axelrod posted something rather interesting, Metrics
<http://www.bloginfosec.com/2008/05/12/metrics-revisited-%e2%80%93-applicati
on-security-metrics/>  Revisited - Application Security Metrics, where he
comes right out and says:

"I have recently been giving some thought to, and doing some research into,
application security metrics, and I have determined, quite simply, that
there aren't any good ones."

Then check out his next question...

"One application has 100 inherent vulnerabilities, of which 10 are
discovered and patched. Another application has 1000 inherent
vulnerabilities, of which 900 are known and fixed. The former has 90
residual vulnerabilities, and there are 100 remaining in the latter
application. Which application is more secure?"

A damn fine question and an answer he digs into.

3) Ready to rip into PCI-DSS 6.6? If you haven't done so already or have an
still don't know what to do -- WhiteHat's own Trey Ford
<http://treyford.wordpress.com/>  posts Deconstructing
<http://www.scmagazineus.com/Deconstructing-PCI-66/article/110013/>  PCI 6.6
inside SC Magazine. Trey takes the "Find, fix, prove(n)" model which
really makes things simple.

"With a clear understanding of PCI Requirement 6.6, compliance is not only
achievable, but can provide great value to web application owners and users.
This requirement creates a need for visibility into the lifecycle for
vulnerability detection and correction, and will serve to mature web
application security. Applying metrics to the efficiency of detection, the
cost of producing vulnerable code, and the associated costs of correction
will only serve to advance the goal of total web application security."

 

[Ph4nt0m] <http://www.ph4nt0m.org/>  

[Ph4nt0m Security Team]

                   <http://blog.ph4nt0m.org/> [EMAIL PROTECTED]

          Email:  [EMAIL PROTECTED]

          PingMe:
<http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=hanqin_wu
hq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724> 

          === V3ry G00d, V3ry Str0ng ===

          === Ultim4te H4cking ===

          === XPLOITZ ! ===

          === #_# ===

#If you brave,there is nothing you cannot achieve.#

 

 


--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

<<inline: image001.gif>>

回复