How to Find Information Leakage Exploit

The Dangers of Sensitive Information Leakage

Accidental data leakage is an increasingly common source of breaches. In 2018 Twitter inadvertently logged all of its users’ login credentials creating a potential breach of 330M records. In 2017 Uber was breached for 57M records in an attack that started from sensitive data inadvertently pushed into a public github repository. Despite being the most dangerous vulnerability in OWASP Top 10 Application Security Risks, over 72% of web applications are leaking sensitive data. Furthermore, new privacy regulations, such as GDPR and the California Consumer Privacy Act of 2018, have massively expanded the types of data organizations must safeguard.

Ocular: 14 Day Free Trial

Accidental Critical Information Leakage Exploits Headlines

Preventing Information Leakage Attacks with Ocular

1

A comprehensive REPL to explore far deeper than grep

Ocular provides a customizable Read Eval Print Loop (REPL) approach to iteratively interrogating code. Analysts with more sophisticated code exploration needs, can leverage the comprehensive CPG graphical mapping to create highly specific and targeted queries, bypassing common sources of false positives. Examples include the ability to identify any custom sanitizations present in the code, where user input is properly secured, and the presence of any indirect data flows, where user input is not directly used in a sink.

2

Detect business logic vulnerabilities

Ocular queries accelerate the process of examining the various software elements and flows to identify complex business logic vulnerabilities, that can't be scanned for automatically, such as PII that goes unencrypted at rest, abuse of functionality, insufficient process validation, and other common examples as defined by the OWASP

3

Integrate into DevSecOps pipelines

Ocular query results are available and exportable via standard JSON format for easy integration into the security tools in use by the organization,and for sharing data across the SDLC.

Awards & Recognition

Hunting Exploits with Ocular

Security Misconfiguration

XML External Entity Processing

Denial of Service (DOS) Attack

Cookie Poisoning

Zip Slip

Information Leakage

ShiftLeft Ocular

Ocular Free Trial

Analogous to the way Google Maps provides a representation of your unique geographical location, the various routes available and possible destinations, ShiftLeft Ocular provides code auditors and reviewers with a platform to construct, and tune powerful, highly customized queries for interactive interrogation of their unique code bases and environments.

Get started with your free trial today!

FREE TRIAL