NPM Package Confusion

NPM Package Confusion

In this article I will demonstrate how an organization exposed themselves to an NPM package takeover. Vulnerability: Dependency Confusion Impact (In increasing order of severity): An attacker can submit unauthorized code into the victim’s software development...
Analysis of Malicious Phishing Email

Analysis of Malicious Phishing Email

A while back I worked an incident for a company which stemmed from a phishing email. When I start working incidents with a clear entry point I always enjoy analyzing the malware for a variety of reasons. As it pertains to recovery, it’s an excellent way to begin...
CSRF to Account Takeover

CSRF to Account Takeover

My wife and I are regulars at a popular boutique fitness studio which, as all things must, comes with a web app. So naturally I decided to take a look under the hood to see what sort of trouble I could get into. In this case I was already looking for Cross-Site...
Adversary Levels

Adversary Levels

1. Level 1 – Common Adversary: This level of adversary is the lowest level tier. Most adversaries at this level are not directly targeting an organization but aiming to attack any easy target or organization. This adversary utilizes basic and free tools with little...