Hi there, I’m Bradley 👋🏻

Security engineer by day (and often by night too…)

This blog is where I try to share my mental models about security that I find useful.

You can follow what I’m doing on any of these platforms below. Currently most active on Twitter.

👇🏻

Are you building features for phishers?

People expect companies/services to tell them when untoward things could be happening to their accounts: Their account has logged in on a new device Their password has been changed An export of their data was started These examples are things you should probably be notified about. But, if you go overboard with these warnings, you might find phishers triggering them intentionally. A bad security warning Imagine receiving this warning email:...

January 6, 2022 · 4 min · Bradley Kemp

A Suspicious CVC

I once got a debit card with the CVC number 000. Now, in theory, I know there’s nothing wrong with this. The number was chosen randomly and it being “special” is purely in my head. In fact, if 000 were excluded from the picking process, there’d be fewer possible CVCs and so overall they’d be less secure. But, 000 still feels really wrong as a CVC. Was it a bug? Did an entire batch of cards get generated with the same CVC?...

August 21, 2021 · 1 min · Bradley Kemp

LaunchDaemon Hijacking: privilege escalation and persistence via insecure folder permissions

LaunchDaemon (or LaunchAgent) Hijacking is a MacOS privilege escalation and persistence technique. It involves abusing insecure file/folder permissions to replace legitimately installed, misconfigured LaunchDaemons with malicious code. I first spotted this issue affecting the OSQuery installer but went looking and found multiple other products with the same problem. This isn’t a novel technique (it’s briefly mentioned in T1543.004) but I was surprised to find it so rarely talked about. Example – Hijacking the OSQuery LaunchDaemon 😇 I’ve already disclosed this issue to the OSQuery team and they kindly let me use it as an example in this post....

May 10, 2021 · 5 min · Bradley Kemp

6 ways to detect phishing sites using high-entropy strings

You’d expect phishing sites to be hard to detect and track, but actually, many of them contain HTML fragments that uniquely identify them. One example doing the rounds at the moment is a bunch of Royal Mail phishing sites which all contain the string css_4WjozGK8ccMNs2W9MfwvMVZNPzpmiyysOUq4_0NulQo. These sorts of long, random strings are extremely good indicators for tracking phishing sites. Any webpage that contains css_4WjozGK8ccMNs2W9MfwvMVZNPzpmiyysOUq4_0NulQo is almost certainly an instance of that Royal Mail phishing kit....

April 14, 2021 · 8 min · Bradley Kemp

Simple A/B testing with Caddy and Plausible Analytics

This post first appeared on the QueryCal technical blog. A/B testing is a lifesaver for a solo SaaS developer. While it’s hard to predict whether a 14-day or 1-month trial is going to get a better signup rate, it’s really simple to test: show half of people the 14-day button and the other half the 1-month button and just measure the click-through rate. There are loads of tools out there to help you do this, but rule #1 of running a micro-SaaS like QueryCal is to keep your technology stack simple—it’s better to focus your time on features, not integrating a bunch of different technologies....

March 8, 2021 · 6 min · Bradley Kemp

Assurance alerts: when measuring false-positive rate can be misleading

Nobody likes alerts that feel like a waste of time to review. But, how do you tell whether an alert is actually a waste of time? The go-to metric to use is false-positive rate—if an alert has high a false-positive rate then it’s “noisy” and might be getting rid of. But, trying to distill the performance of an alert down to a single number is hard and false-positive rate might be a particularly bad choice....

February 8, 2021 · 8 min · Bradley Kemp

Spending your security goodwill budget wisely

Making users more secure generally means annoying them. Whether it’s making them carry a hardware security key or just enforcing a short screensaver timeout, changing how people go about their work is annoying—and an annoyed user is not a secure user. The effectiveness of a lot of security controls relies on the user cooperating. If they get frustrated with all the barriers and friction between them and doing their actual job, they might just find ways around the controls—their shortened screensaver timeout is soon “fixed” with a keep-awake app and now they’re less secure than they were before....

January 4, 2021 · 6 min · Bradley Kemp

How intrusion detection honeypots work so well

Intrusion detection honeypots are just plain cool. They’re incredibly simple to run and give you extremely accurate alerts about intruders in your systems. A honeypot can be as simple as a fake server inside your network that alerts if anyone connects to it. There’s no reason to intentionally connect to this bogus server, so any attempts are probably an attacker already inside your network. Unfortunately, that’s about as far as most people get with them....

December 8, 2020 · 5 min · Bradley Kemp

Snapshot Testing Is Hard -- Pitfalls To Avoid

Snapshot testing is an extremely fast way to add regression testing to an existing project. You simply take some example inputs and then snapshot the resulting outputs. From then on, you can have a high degree of confidence that any changes you make have not affected backwards compatibility (as this would have been detected as a change in a snapshot). However there are many pitfalls you can run into as I found when writing cupaloy, a snapshot testing library for Go....

December 19, 2017 · 3 min · Bradley Kemp