Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - If you thought our name was dumb, look at this slogan we got.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » February 2013 » Vulnerabilities served up

Vulnerabilities served up


Contributed by: Email on 02/25/2013 03:12 PM [ comments Comments ]


A new search engine for vulnerabilities is rubbing salt into the wound that is web application security. Security problems that endanger visitors' data, like cross-site scripting (XSS) attacks and SQL injections, are widespread. Punkspider systematically searches the entire internet for these vulnerabilities and documents its results publicly. Hyperion Gray's concept is simple: take a scalable Hadoop cluster, use many parallel spider scripts to scan millions of web sites for security vulnerabilities and make the results publicly accessible through a custom search engine.

The results available for .de domains are not particularly impressive at the moment. Out of an apparent 50,000 web sites that have been tested, the search engine says it found cross-site scripting vulnerabilities on about 50, SQL injection problems on 16 and blind SQL injection vulnerabilities, which are actually harder to detect, on about 120. Results for .co.uk domains showed even less success: 32,290 sites scanned, with 30 XSS vulnerabilities, 2 SQL injection problems, and 60 Blind SQL injection vulnerabilities. The quality of these results is all over the place. In random tests run by The H's associates at heise Security, some of the vulnerabilities could be immediately verified using a test URL; others, however, had no detailed information whatsoever (where the scanner might have crashed), while a couple were most likely false alarms.

Hyperion Gray's method is unconventional at best and is the subject of heated debate at the moment, with "centralized vulnerability database for script kiddies" being one of the tamer accusations. The legal aspects also deserve attention – not only are sites being scanned for security vulnerabilities without prior consent, the results are also being widely published. The debate rages on.

Web admins have a difficult decision to make now. If they search for their site, they may be relieved to find no results, but worried that they have made themselves targets for future Punkspider scans. If they refrain, they have to wonder whether other people are looking at the results for their site – and finding something useful. There's no information on how an admin can exclude their own site from a punkscan, and heise Security's questions for the service's provider on this and other subjects have not yet received a response. According to CTO Alejandro Caceres, however, instructions in the robots.txt control file are checked and respected. Indeed, he considers his new service to be good rather than evil: "The goal of my project [is] to alert firms to such vulnerabilities – for free – so that they could have their web developers fix it."






« Another iPhone Passcode Bypass Vulnerability Discovered · Vulnerabilities served up · Malware threatening offshore rig security »




Comments
comments powered by Disqus

MajorGeeks.Com » News » February 2013 » Vulnerabilities served up

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition