2015

13 March, 2015

OWASP CRS block rules in production

Web Application Firewalls (WAF) are a neat strategy to protect your webservers from malicious connections. All of the WAFs in the market work similarly. You define rules of what you think is good or bad traffic and the WAF tries to detect attacks based on that. But your WAF will always just be as good as your rules. The OWASP CRS Instead of having to write all your own rules, the OWASP Project has a Core Rule Set (CRS) which you can download for free from their website.

23 January, 2015

SSL / TLS Scanner

With all the recent bugs in OpenSSL, every security officer needs her SSL / TLS scanning infrastructure to make sure she does not miss a service when updating and fixing everything. hrafn Why an SSL / TLS scanner Running encryption has become a hassle recently. Mostly because of four factors. Everybody and the world is using OpenSSL to secure transport to and from (mostly) web applications. OpenSSL has an excellent track record of messing up secure code.

2014

1 December, 2014

Intercepting Proxy Part I

While preparing a security awareness demo, a friend of mine and I decided to work with an intercepting proxy. This is what we did. The situation A friend of mine (let’s call him Roger) and I were asked to do an awareness demo in front of the upper management of an international company. It should contain something which could happen to them and it should not be too technical. We chose a scenario with mobile devices.