Recent Blog Posts

  • Dezinformatsiya
    I recently wrote a review on Active Measures by Thomas Rid - which helped me to solidify my thoughts on social media, and the impact it has on society. While Active Measures is focused on disinformation campaigns, it also speaks to the vulnerabilities in humans that allow these campaigns to…
    Continue reading »

  • Book Review: Active Measures
    Thomas Rid has delivered with Active Measures, it's clear, surprisingly entertaining, and extremely well sourced. This is a must-read if you want to understand how disinformation operations work, and more importantly, how we managed to find ourselves in a world where it's hard to trust anything. The book starts with…
    Continue reading »

  • Checklist: Starting a Security Consulting Firm
    Recently a friend of mine asked for input on what would be needed to launch a new security consulting company, to help him out I drafted a detailed list of what would need to be done for a successful launch. Here is an expanded version of that list, hopefully others…
    Continue reading »

  • YAWAST: News & Mission
    It's been some time since I last wrote about YAWAST on here, it was actually back in April when I posted the last update - that was for the release of YAWAST v0.7.0. Currently, it's at version 0.11.0 and a lot has changed. It's been rewritten from scratch, more people…
    Continue reading »

  • Utilitarian Nightmare: Offensive Security Tools
    Or: Ethical Decision Making for Security Researchers There has been much discussion recently on the appropriateness of releasing offensive security tools to the world - while this storm has largely come and gone on Twitter, it's something I still find myself thinking about. It boils down to a simple question,…
    Continue reading »

All Blog Posts | Archive

Recent Security Research

  • Exploiting the Jackson RCE: CVE-2017-7525
    Earlier this year, a vulnerability was discovered in the Jackson data-binding library, a library for Java that allows developers to easily serialize Java objects to JSON and vice versa, that allowed an attacker to exploit deserialization to achieve Remote Code Execution on the server. This vulnerability didn't seem to get…
    Continue reading »

  • Breaking the NemucodAES Ransomware
    The Nemucod ransomware has been around, in various incarnations, for some time. Recently a new variant started spreading via email claiming to be from UPS. This new version changed how files are encrypted, clearly in an attempt to fix its prior issue of being able to decrypt files without paying…
    Continue reading »

  • PL/SQL Developer: HTTP to Command Execution
    While looking into PL/SQL Developer - a very popular tool for working with Oracle databases, to see how it encrypts passwords I noticed something interesting. When testing Windows applications, I make it a habit to have Fiddler running, to see if there is any interesting traffic - and in this…
    Continue reading »

  • PL/SQL Developer: Nonexistent Encryption
    (See here for another issue discovered during this research; Updates over HTTP & Command Execution.) PL/SQL Developer by Allround Automations has an option to store the user's logon history with passwords - the passwords are encrypted with a proprietary algorithm. At this point, you should know how this is going…
    Continue reading »

  • Verizon Hum Leaking Credentials
    or, Christmas Infosec Insanity... A friend mentioned Hum by Verizon, a product that I hadn't heard of but quickly caught my attention - both from a "here's a privacy nightmare" perspective, and "I might actually use that" perspective. While looking at the site, I decided to take a look at…
    Continue reading »


  • YAWAST – The YAWAST Antecedent Web Application Security Toolkit
  • libsodium-net – The .NET library for libsodium; a modern and easy-to-use crypto library.
  • ccsrch – Cross-platform credit card (PAN) search tool for security assessments.
  • Underhanded Crypto Contest – A competition to write or modify crypto code that appears to be secure, but actually does something evil.

Insane Ideas Series

The Insane Ideas series is a group of blog posts the detail various ideas that I found interesting, but didn’t pursue due to time restrictions or other factors. The goal of publishing these ideas is to make the concept available to others, in hopes that they will pursue the idea – or at least find amusement in it.

Consulting & Services

I am available for certain consulting projects; especially in the areas of application security, cryptography, secure systems design, and application penetration testing. For more information, please contact me.

About Adam Caudill

Adam Caudill is a security consultant with over 15 years of experience in security and software development; with a focus on application security, secure communications, and cryptography. Active blogger, open source contributor, and advocate for user privacy and protection. His work has been cited by many media outlets and publications around the world, from CNN to Wired and countless others.