Julian Berton

Hey, I'm Julian Berton, author of this blog, organiser of the OWASP Melbourne chapter and Security Engineer at seek.com.au. I also regularly speak at events and train technology professionals about all things security!

Building an Application Security Programme

01 Aug 2017

An application security programme is your company’s product security game plan, that has a goal of reducing the number of security flaws introduced into the application over the course of its software lifecycle. While, at the same time increasing the difficulty of exploitation (i.e. making it harder for an attacker to find vulnerabilities) and reducing security risks, such as data loss…

Read More

Defensive Application Security in a Modern Organisation

10 Jul 2017

Defending web and mobile applications against the bad guys has always been hard, there is no escaping that fact. However it doesn’t seem to be getting any easier either. Evolving development practices (Agile, DevOps, CD/CI, IaC) have a big part to play, but there are several other trends that are also not helping the situation. So in this modern world of development, how can we better secure these applications?

The short answer is we need to change the way we approach application security, by designing an application security programme or secure software development lifecycle (SSDLC) that fits better into these evolving development practices…

Read More

Thinking Like A Hacker - DDD Melbourne 2016

13 Aug 2016

I presented a slightly updated from DDD Sydney deck at DDD Melbourne about what motivates hackers to break into systems and how you could approach securing your company’s web application at scale. DDD Melbourne is a non profit community event in Melbourne run by developers for developers.

Read More

Thinking Like A Hacker - DDD Sydney 2016

29 May 2016

I presented at DDD Sydney about what motivates hackers to break into systems and how you could approach securing your company’s web application at scale.DDD Sydney is a developer focused conference held in Sydney Australia.

Read More

Bypassing Root Detection on Android

30 Jan 2015

When performing a penetration test on an Android or iOS application the developer can implement what are called binary protections that hinder an attacker from easily analysing an application. Some of the more common protections are SSL pinning, code obfuscation and root detection. This article explains how to bypass the latter, namely root detection on Android.

Read More

Bypassing XSS Filters with Scalable Vector Graphics (SVG)

13 Oct 2014

When you are performing a pen test or participating in a bug bounty program, sometimes you are confronted by a Web Application Firewall (WAF) designed to block malicious payloads. To properly identify and exploit a Cross-site Scripting vulnerability you will need to find a way around it! This article demonstrates a method of creating an SVG based payload to bypass those pesky WAF’s.

Read More