Episode 45: Our Most Common External Pen Test Findings
Jun 14, 2023
auto_awesome
Tyler and Brad delve into the most frequent vulnerabilities found during external penetration tests. They unpack user enumeration issues on law firm websites and the risks of exposing personal information. The conversation shifts to cross-site scripting vulnerabilities, stressing the dangers of outdated web libraries. They also analyze security flaws in WordPress and the critical need for patch management. Finally, they highlight how implementing DMARC records can significantly bolster email security against attacks and domain misuse.
21:08
AI Summary
AI Chapters
Episode notes
auto_awesome
Podcast summary created with Snipd AI
Quick takeaways
User enumeration and the gathering of personal data from public sources significantly increase the risk of tailored cyber attacks, particularly affecting law firms.
Despite being a longstanding issue, cross-site scripting remains prevalent in web applications, often exacerbated by poor patch and vulnerability management practices.
Deep dives
Common External Pen Test Findings
User enumeration is frequently encountered during external penetration tests, particularly in law firms that publicly list their lawyers' email addresses. This practice can lead to easy exploitation, as attackers can harvest sensitive information directly from the HTML of the website. Similarly, personal information about individuals from various public sources contributes to security vulnerabilities, as this data can often serve as answers to security questions used elsewhere online. Many organizations underestimate the risks associated with publicly available information, enabling malicious actors to craft more convincing attacks.
Cross-Site Scripting and Vulnerability Management
Cross-site scripting (XSS) remains a prevalent finding in web applications, despite being a well-known issue for over two decades. Attackers can exploit XSS vulnerabilities, not just for harmless pranks, but to facilitate phishing attacks or to leverage them in conjunction with other vulnerabilities. Often linked to outdated libraries, such as jQuery, XSS reveals a broader issue of poor patch and vulnerability management. Organizations that overlook the maintenance of their web applications expose themselves to significant security risks by failing to update libraries and manage configurations properly.
Misunderstood Risks in TLS/SSL Configurations
Issues with TLS/SSL configurations are commonly identified in penetration tests, including outdated protocols and misconfigured certificates. Despite their classification as medium to critical risks, many of these vulnerabilities are theoretical and rarely exploited in practice. The flawed prioritization of vulnerability scores can mislead organizations about the relative risks of different vulnerabilities, resulting in a misallocation of resources. It is crucial for organizations to adopt a nuanced understanding of these risks, ensuring they focus on the most relevant security concerns rather than simply relying on standardized scoring systems.
In this episode, Tyler and Brad talk about the most common external penetration test findings. We see these findings over and over again and want you to know what to do about them and how they may impact you.