Mini Pen Test Diaries story:

Did a pentest on a very widely used electronic health records (EHR) portal.

Found they were sending values like “patient id” using some custom encryption mechanism (always a good idea, right?) and then base64 encoding the value.

Found a directory with directory browsing enabled called “/test”

That directory was handily left behind by the devs and included lots of scripts for doing things with the app.

One of those things was an encrypt/decrypt tool that let you use their custom encryption mechanism.

Decrypted my patient ID using the script, incremented it by 1, and re-encrypted it. Called API’s with new encrypted patient ID.

PHI o’clock!

Wanna know the scariest part? This is an app built within the last 4 years.

Read more, less-mini, stories like this at infosecdiaries.com.

#infosec #cybersecurity #infosecreads

Mini Blue Team Diaries Story:

Was responsible for SecOps at a SaaS platform that managed lots of things for companies, including travel bookings.

We had a bunch of customers in the higher education space who used SSO to login to our app. Unfortunately, MFA within the SSO configuration was not common back then, so a compromised university account would lead to much access, including to our platform.

Suddenly, a thing we saw a lot of, was higher-ed customers reporting that they were being charged for trips that just didn't make sense. These were bookings for same day travel, usually between two African cities.

After some digging around and investigation, we figured out that a threat actor would phish or purchase the users university credentials, then, using the SSO into our environment, they'd make bookings using the travel booking feature - those bookings were made on behalf of the threat actors customers, who actually thought they were dealing with a legit, well-connected travel agent.

We were able to advise our customers on how to stop this type of thing happening, with approval rules for bookings, and ya know, MFA, and also managed to build in some detective controls so our team could detect and shut down such bookings as soon as they came in.

What made this particularly interesting though, through some OSINT, we were able to determine the true identity of the actor responsible - and we connected with them on Facebook, mainly because we wanted to ask them about their methods now that we'd all but shut down their scheme.

We chatted for a bit, and got some useful intel. At the end, the actor congratulated the team on our new controls, and said they'd moved on to using another service they'd found to make his bookings.

For more, slightly less mini, Blue Team Diaries stories like this, check out https://infosecdiaries.com

#infosec #DFIR #BlueTeam #infosecreads #cybersecurity

Infosec Diaries

Learn Pen Testing, Blue Teaming and Digital Forensics

Infosec Diaries

One of my favorite things to do is write books, specifically, books about Information Security. I've written a mixture of fiction and non-fiction titles over the years, that use a variety of techniques to teach folks about the industry.

You can find them wherever books are sold, and also Walmart for some reason!

Check out https://www.infosecdiaries.com/ to learn more about all of them.

#infosec #infosecreads #DFIR #BlueTeam #pentesting #DigitalForensics #cybersecurity

Infosec Diaries

Learn Pen Testing, Blue Teaming and Digital Forensics

Infosec Diaries

Breaking in is half the battle.

The Pen Test Diaries allow you to follow penetration tester Laura Knight through the technical, and non-technical processes involved in testing an organisations information security measures.

Based on the author's real world experiences, the diaries tell fictionalised versions of penetration testing discoveries. A must read for anyone interested in computer security or the penetration testing field.

https://www.infosecdiaries.com/

#infosec #pentest #pentesting #infosecreads #cybersecurity #cybersecurityreads

Infosec Diaries

Learn Pen Testing, Blue Teaming and Digital Forensics

Infosec Diaries

Mini Pen Test Diaries story:

Did a pentest on a very widely used electronic health records (EHR) portal.

Found they were sending values like “patient id” using some custom encryption mechanism (always a good idea, right?) and then base64 encoding the value.

Found a directory with directory browsing enabled called “/test”

That directory was handily left behind by the devs and included lots of scripts for doing things with the app.

One of those things was an encrypt/decrypt tool that let you use their custom encryption mechanism.

Decrypted my patient ID using the script, incremented it by 1, and re-encrypted it. Called API’s with new encrypted patient ID.

PHI o’clock!

Wanna know the scariest part? This is an app built within the last 4 years.

Read more, less-mini, stories at https://infosecdiaries.com.

#infosec #cybersecurity #infosecreads

Infosec Diaries

Learn Pen Testing, Blue Teaming and Digital Forensics

Infosec Diaries