Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    primarykey
    data
    text
    <p>It's hard finding someone who is really good at this stuff (the company I work for retain the services of a leading UK Security Company - and I've not only found stuff they've missed - I've had to explain to them why it's a problem).</p> <p>To answer your questions, by far the most important thing you can do is ask him to prove that your code is vulnerable by demonstrating an attack. </p> <p>He's got a much easier job than anyone attacking your site - since you've already provided him with the source code (I'm not suggesting that's a bad idea - it saves a lot of expensive messing about). I would recommend you set up a copy of your live system as a target for his attacks - in addition to protecting your system if he is successful, it should allow you to test out the security monitoring you've already got in place to detect attacks.</p> <p>The fact that he describes use of eval(), fopen() as input vulnerability issues is extremely odd. If it were me I'd have provided a set of classification criteria (XSS, CSRF, SQL injection, code injection MITM, data leaks, network/OS vulnerabilities) along with scoping of the testing well in advance of agreeing a contract - and would have classified these as potential code injection attacks.</p> <p>If you've already run automated checks against your system then presumably you've already investigated and dismissed the potential issues - so why are you paying someone to tell you about this? I'd have provided a list with the areas you've already looked at.</p> <p>I'd also want him to provide details of the stuff he has examined which did not show a vulnerability.</p> <p>He should also be appraising your code for the likely impact should the system be compromised (and by what means). e.g. storing credit cards / passwords in a recoverable form - even if your website is currently 100% secure now (which CANNOT be proven) what will happen when an attacker manages to brute-force an SSH session? Is there a host-based IDS in place and a deployment process which reconciles changes?</p> <p>If you've already contracted him to provide the checks then its a bit late now to change the terms of the contract, but you've learnt a lot before you go through the process again.</p>
    singulars
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. VO
      singulars
      1. This table or related slice is empty.
    2. VO
      singulars
      1. This table or related slice is empty.
    3. VO
      singulars
      1. This table or related slice is empty.
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload