Skip to main content

Pentest Chronicles

If you’re interested in the world of cybersecurity, the related technical issues, and what’s challenging right now, you’re in the right place! This part talks about IT security more broadly and has the latest information, tips, and advice.
Illustration of Pentest Chronicles

Latest insight

Other articles

Illustration of Denial of Service attack via web cache poisoning – Vulnerability Analysis

Denial of Service attack via web cache poisoning – Vulnerability Analysis

Mikołaj Pudlicki

During security tests, a critical vulnerability was discovered in the tested application. This issue allows an attacker to block access to the application. The problem is caused by incorrect cache handling. Web cache poisoning is an attack where an attacker exploits the caching mechanism to store altered or malicious responses in a cache entry, forcing the website to serve harmful HTTP responses to its users. When improperly implemented, caching mechanisms significantly increase the risk of for example denial of service (DoS) conditions, by serving incorrect cached responses to legitimate users.

READ article
Illustration of (Not) Easy authorization

(Not) Easy authorization

Jacek Siwek

Vulnerabilities from the broken access control group according to OWASP TOP TEN 2021 are among the most common in web applications. They give users with lower privileges the ability to, among other things, access data or functions that are not intended for such a role. It also happens that an ordinary user can use functionalities belonging to the administrator, which can also lead to privilege escalation. Sometimes, these vulnerabilities are unusual in nature because they are not always related to flaws in the application logic... In such cases, testing should also include more complex scenarios that go beyond the classic approach.

READ article
Illustration of Breaking license validation in a desktop application – how business logic flaw can enable unauthorized activations

Breaking license validation in a desktop application – how business logic flaw can enable unauthorized activations

Piotr Ćwikliński

During one of my security audits, I discovered a business logic flaw in the license verification process of a macOS desktop application. This flaw made it possible for an ordinary user with basic hacking skills to bypass restrictions and activate the software on multiple devices, even though the license was meant for just one machine. The issue was caused by insufficient server-side validation. While some parameters and their values in the activation request were correctly validated, others were either ignored or not used at all for verification.

READ article
Illustration of How Secure Are Your Application Secrets? Lessons from Years of Real-World Penetration Tests

How Secure Are Your Application Secrets? Lessons from Years of Real-World Penetration Tests

Mateusz Lewczak

In the context of web applications, 'secrets' refer to sensitive data used to secure communication, authenticate users, or access restricted resources. These are critical pieces of information that must be protected to maintain the security and integrity of the application. First and foremost, it's important to acknowledge that the secure storage of secrets in applications is still an unresolved challenge. Many developers find this aspect unclear or challenging.

READ article
Illustration of Vishing – How It Works and Why It's So Effective: Insights from Commercial Social Engineering Tests

Vishing – How It Works and Why It's So Effective: Insights from Commercial Social Engineering Tests

Jacek Siwek

Vishing is a type of social engineering attack in which scammers call their victims, pretending to be trusted individuals or institutions (such as IT departments, banks, or service providers) to extract confidential information or manipulate them into performing specific actions. While the conversation may seem harmless, it can lead to the disclosure of login credentials to company systems or even the execution of malicious software.

READ article
Illustration of The Hidden Danger in PDFs: How Misconfigurations Can Expose Sensitive Data?

The Hidden Danger in PDFs: How Misconfigurations Can Expose Sensitive Data?

Patryk Bogdan

Recent security audit revealed a critical vulnerability in the way WeasyPrint processes user-provided data for generating invoices in PDF format. The issue occurs because of insufficient input validation, allowing attackers to inject malicious HTML tags that are rendered within the generated PDF. This flaw opens the door to extracting sensitive files from the application's infrastructure or querying remote resources, posing significant security risks.

READ article
A professional cybersecurity consultant ready to assist with your inquiry.

Any questions?

Happy to get a call or email
and help!