After a bit of insomnia, I released the Image Location and Privacy Scanner version 1.1, my passive HTTP scanning plug-in for PortSwigger Burp Pro and OWASP ZAP. It contains a few minor updates, speed ups, and new hidden location tag detection compared to the previous version. More importantly, it has better documentation which might lead… Read More


In a previous blog post, I wrote about a whole bunch of HTTP headers which compromise your security and how to disable them all on many different types of servers. This time, I discuss “good” headers and give instructions for enabling. I also delve into “possibly good” headers including when you might need them and… Read More


Welcome to the Veggiespam’s Secure HTTP Headers page where I provide my whitepapers showing how to secure the headers on your website. The content here is updated as technology, standards, and best practices change over time.… Read More


Abstract Many applications still utilize older cryptographic technologies, even though security professionals warned that these are obsolete and unsafe to use. Some implementations can easily be upgraded to current encryption and contain a graceful fall-back for situations where it’s required, such as when a remote party only supports legacy technologies (e.g., TLS downgraded connections). Other… Read More


A vastly updated version of my AWS S3 Bucket Auto-Encryptor has been released! Zocdoc‘s ZocSec.SecurityAsCode initiative focuses on delivering Security by automating detection and remediation of security issues across an AWS environment. With our Security as Code techniques, you can greatly reduce time from detection to resolution and minimize impact to the business. ZocSec is… Read More


Somewhere in my spam folder today, I noticed this pathetic email, containing my old and no longer valid Linked-In password: I am aware {$Linked-In-Password$} one of your pass word. Lets get directly to the point. You do not know me and you are most likely wondering why you’re getting this mail? No one has compensated… Read More


It’s Here, Version 1.0 The Official v1.0 release of the Image Location & Privacy Scanner has arrived! This security tool plugin for Burp or OWASP ZAP security proxy tools will scan images for privacy exposure including GPS locations, camera serial numbers, even facial recognition tags. See my presentation about this software at this link. Version… Read More


Smoke – A unified means of generating, transmitting, encapsulating, and validating multiple hash digests simultaneously to replace existing stand-alone hash digest software. The software generates digests in parallel and is notably faster than using individual algorithms serially on large files. Smoke operates much the same way as existing hash digest tools, like md5sum, and Smoke… Read More


Background & Summary Existing websites and applications implementing an older password hashing algorithm like MD5 or SHA1 must be upgraded to a more secure algorithm. Both of these older algorithms are obsolete & breakable and if an attacker obtains those hashes from a lost backup tape or website vulnerability, the attacker could make quick work… Read More