Search
“OWASP A01:2021-Broken Access Control”
“Moving up from the fifth position, 94% of applications were tested for some form of broken access control with the average incidence rate of 3.81%, and has the most occurrences in the contributed dataset with over 318k.” (OWASP.org) What is broken access control? Let's take a step back and talk about access control. Companies follow the principle of least privilege, which basically says, “Hey, we only grant access for certain things, and you can't do things outside of your

Jen C
2 days ago2 min read


Avoid Cryptographic Failures With These 6 Easy Steps
In a previous article, I discussed cryptographic failures. Well, we’re gonna talk about it a bit more. Don’t think of it as a comeback, but a remix? We’ll actually focus in a little deeper on these three areas of Cryptographic Failures: Exposed Key/Poor Key Management Insecure Randomness Weak Algorithm Use/Inefficient Algorithms For a brief refresher, what is a Cryptographic Failure? It’s a symptom, not necessarily a cause! It’s a security vulnerability that happens when a th

Jen C
2 days ago3 min read
Cross-Site Scripting (XSS)
No, XSS isn't a shirt size. It stands for Cross-Site Scripting. These are attacks when an attacker injects a malicious script into a trusted website in a user-provided input. They might use a web application to inject the malicious code. This frequently happens when a web application uses input from a user but generates without validating or encoding the data passed. They can also launch an attack by modifying a request. In summary, XSS is a vulnerability that can enable th

Jen C
2 days ago2 min read


Security Misconfiguration? Sounds like a job for Agent Burt Macklin
OWASP Topic — “A05:2021 Security Misconfiguration” “Moving up from #6 in the previous edition, 90% of applications were tested for some form of misconfiguration, with an average incidence rate of 4.%, and over 208k occurrences of a Common Weakness Enumeration (CWE) in this risk category.” -OWASP What? Security Misconfiguration? Man, this sounds serious! What exactly is a Security Misconfiguration? They are attacks that exploit weaknesses in configurations found in our web ap

Jen C
3 days ago3 min read


HSTS Max-Age Directives and Cyborgs
Let’s learn about HSTS Max-Age Directives. Is it just me, or does this sound like something out of RoboCop or Wall-E? What is your directive LOL? Ok seriously now, what are we talking about? Let’s start with the basics. HTTP Strict Transport Security, or HSTS, is a response header that improves a site’s security as it instructs the browser to always use HTTPS instead of HTTP when visiting your site. It helps to protect against man-in-the-middle attacks and other vulnerabilit

Jen C
4 days ago2 min read


BIGFOOT IS REAL! And So Is The Need For HTTP Response Security Headers
I got your attention, didn’t I? HTTP response security headers are a fundamental part of website security and are easy to implement too! As a subset of HTTP headers, they are exchanged explicitly between a client and a server to specify security details for HTTP communication. They can help prevent modern browsers from easily falling prey to preventable vulnerabilities and protect against common attacks, such as cross-site scripting (XSS), clickjacking, information disclosure

Jen C
6 days ago2 min read


OWASP Topic: A06:2021-Vulnerable and Outdated Components
“Vulnerable Components are a known issue that we struggle to test and assess risk and is the only category to not have any Common Vulnerability and Exposures (CVEs) mapped to...” https://owasp.org/Top10/A06_2021-Vulnerable_and_Outdated_Components/ Vulnerable and Outdated Components. Ugh. Gross. Sounds like a communicable disease and an outdated vaccine for an application. Wait, maybe that’s a good analogy. Let’s roll with it. What exactly is a Vulnerable and Outdated C

Jen C
7 days ago3 min read


Jen's Agile Cliff Notes - SMART Goals
What is a SMART Goal ? It can apply to any goal you set, not just Agile-related ones. We write our PI Objectives in SMART goal format, but it can also be used to write better sprint goals. A SMART Goal is scientifically proven to help teams set and achieve goals. They excel at providing the framework to create a compelling PI Objective or Sprint Goal. You can even use them for retrospective goals! Let’s dive in… They give you direction. A well-planned goal helps you m

Jen C
7 days ago3 min read


This Injection Doesn’t Come with a Lollipop: How SQL Attacks Sneak Past Your Code
Do you look forward to receiving an injection? No? The same applies for our systems! Let’s learn more about SQL injections and how this can impact our applications! “Injection slides down to the third position. 94% of the applications were tested for some form of injection with a max incidence rate of 19%, an average incidence rate of 3%, and 274k occurrences. Notable Common Weakness Enumerations (CWEs) included are CWE-79: Cross-site Scripting, CWE-89: SQL Injection, and

Jen C
7 days ago2 min read


OWASP Topic — Cryptographic Failures
“Shifting up one position to #2, previously known as Sensitive Data Exposure, which is more of a broad symptom rather than a root cause, the focus is on failures related to cryptography (or lack thereof). Which often lead to exposure of sensitive data.” Cleopatra is making an online purchase of a new sheath dress When I think of cryptographic failures, my mind immediately pictures Cleopatra on her laptop. Close enough, right? For what it’s worth, cryptology really does orig

Jen C
Nov 62 min read


Imposters In Space, Errrr, Web Applications…Broken Access Controls!
We’re going to take a deeper dive into Access Controls ! Let’s jump right in. Broken access controls are the number one vulnerability according to OWASP and the most serious. This may sound harsh, but the truth is that a malicious attacker has exploited a weak access control point in one of our web applications, taking advantage of a vulnerability. Broken access controls have been responsible for data breaches, identity theft, financial losses, and reputational damage to

Jen C
Nov 63 min read
Broken Access Controls — Protect The Fortress!
Published on Medium.com Broken access control could be an attacker exploiting these vulnerabilities, or it could be unintended. They could be: Injection flaws: untrusted input injected into an application. Cross-site scripting (XSS): untrusted input is included in a web page output. Broken authentication/session management: the application doesn’t validate or protect information. Inadequate role-based authorization or allowing users to access functionality beyond their permis

Jen C
Oct 211 min read
Sensitive Data Storage and Exposure
Published on Medium.com We have to be super careful with our client’s sensitive data, including PII, financial records, and login credentials. That’s a given! Sensitive Data Exposure occurs when a web application fails to protect confidential information, accidentally or intentionally. Either way, there are serious consequences. Exposed data can then be exploited by malicious actors, ranging from identity theft to financial fraud. One way this can happen is by returning too m

Jen C
Oct 212 min read


Breach puh-lease! Use of proper logging and monitoring to avoid security breaches!
Posted on Medium.com We don’t want a security breach! That’s why we rely heavily on logging and monitoring our applications-without it, breaches cannot be detected. Though challenging to test, it can be beneficial for accountability, visibility, incident alerting, and forensics. That’s why this is in the OWASP Top 10 of vulnerabilities-to help detect, escalate, and respond to active breaches! A security logging/monitoring failure is a vulnerability that occurs when a system/a

Jen C
Oct 212 min read
Left Lane Ends and Lanes Merge: When Friendships Are Over and New Ones Begin
Written for Medium.com I’ve always believed that some friendships are meant to last a lifetime, while others are only with us for a season. Each serves a purpose during a certain period, and when that time is over, it’s natural to move on. Some of my friendships date back to high school. Now, at my age, I realize how much I’ve learned from these relationships—no matter how cliché that may sound. My best friend, who is my oldest daughter’s godfather, has been in my life since

Jen C
Oct 133 min read


Identification, Authentication and Kenny Loggins and Logouts: What I’ve Learned On My Journey Into Application Security
“Previously known as Broken Authentication , this category slid down from the second position and now includes Common Weakness Enumerations (CWEs) related to identification failures.” ( OWASP ) Kenny Loggins is a famous singer and songwriter spanning multiple decades. If you’re not familiar with his work, just think of Footloose, Caddyshack, or Top Gun, just to name a few. I celebrate his entire collection. Let’s briefly review the basics of identification and authentication.

Jen C
Oct 63 min read


The Universe Works In Mysterious Ways…
https://medium.com/@jencracchiola/the-universe-works-in-mysterious-ways-7095ece9c9be The day my brother proposed to his girlfriend was...

Jen C
Aug 9, 20244 min read
Scattering ashes is not always an easy task — here’s my story
https://medium.com/@jencracchiola/scattering-ashes-is-not-always-an-easy-task-heres-my-story-e0a647db08f9 In March of 2020, we lost my...

Jen C
Jun 28, 20244 min read
Grief Is A Journey
Written for Medium.com https://medium.com/@jencracchiola/grief-is-a-journey-e04c1a87e3dc Grief is overwhelming. Grief is raw. If you do not actively confront your grief, it will consume you. Everyone has a story about their grief—the loss of a loved one, whether spouse, parent, child, or dear friend. No two stories are the same; grief is each person's own journey. With that in mind, let me share mine. My grief journey began on Leap Day 2020, just days before COVID-19 took

Jen C
Apr 26, 20244 min read