This and that about me
My name is Damiano Esposito. I have been active within the information security domain almost my whole professional career. I am an innovative mind with lots of ideas. I love to build things (that break things), to find smart solutions to tackle complex challenges and to explore new pioneering paths. I am convinced that we can turn the world upside down with the right team and mindset and that we can achieve almost anything together. Even though my professional stations have changed slightly over the years, I have never allowed myself to lose touch with technology and current trends.
digitalswitzerland Cybersecurity Committee
I am a member of the digitalswitzerland Cybersecurity Committee representing Migros-Genossenschafts-Bund. The committee is responsible for the output of the cybersecurity program. The goal is to contribute to a cyber-resilient Switzerland.
The information security landscape is complex and constantly changing. Over the years, I have sharpened my expertise and specialized in different areas due to personal or professional interests. My focus areas include, but are not limited to, Security Consulting, Penetration Testing, Automated Security Testing, Attack Surface Management, Security Architecture, Security Engineering, Security Operations and Cyber Defense Centers. Within these domains, I have dedicated my efforts to mastering the complexities of safeguarding digital environments and to continually expanding my knowledge to address evolving security paradigms.
Various topics that interest me and have been occupying me more or less intensively for many years, in no particular order.
Some milestones of mine
This is a brief overview of my professional journey, highlighting key experiences and some of my qualifications. For a more comprehensive and detailed version, take a look at my LinkedIn profile.
Damiano Esposito is Head Security Operations at Migros-Genossenschafts-Bund (MGB). Before his time at MGB, he co-founded the company scanmeter and actively drove both research and development over many years. Scanmeter was acquired by Boltonshield at the end of 2023. He has held various positions as a security consultant, security engineer, security researcher and penetration tester. From time to time, he is also involved in teaching as a guest lecturer or external expert for Bachelor's or Master's theses. He is the author and co-author of various scientific publications in the context of, e.g., automated security testing.
To be honest, I do not care too much about certifications and I am no fan of paying for their validity.
Swiss Cyber Institute, Global Cyber Conference, Zurich (Switzerland)
International Academy, Research, and Industry Association (IARIA), ICIMP2018: The Thirteenth International Conference on Internet Monitoring and Protection, Barcelona (Spain)
European Union Agency for Cybersecurity (ENISA), Lucerne (Switzerland)
European Union Agency for Cybersecurity (ENISA), Fürstenfeld (Austria)
ZHAW School of Engineering, Zürich, Switzerland
Information and Communication Technologies (Information Security)
Master's Thesis: Ideal Usage and intelligent Combination of Security Testing Tools
ZHAW School of Engineering, Winterthur, Switzerland
Software Engineering
Bachelor's Thesis: Umfassende Sicherheitsanalyse der ZHAW Webapplikationen
Migros-Genossenschafts-Bund, Zürich, Switzerland
Migros-Genossenschafts-Bund, Zürich, Switzerland
scanmeter GmbH (acquired by Boltonshield), Zürich, Switzerland
Consecom AG, Zürich, Switzerland
ZHAW School of Engineering, Institute of Applied Information Technology (InIT), Winterthur, Switzerland
ZHAW School of Engineering, Institute of Applied Information Technology (InIT), Winterthur, Switzerland
A small selection of initiatives
Next generation attack surface management platform
Scanmeter modernizes technical cyber security assessments (e.g., penetration tests or attack surface management) by orchestrating automated security testing tools to identify and address vulnerabilities. Targeting web applications, systems, or source code, scanmeter makes use of dynamic (DAST) and static (SAST) security testing methods. Its tailored reports assist during vulnerability mitigation and to track the progress of security maturity.
Scanmeter was acquired by Boltonshield at the end of 2023, I am no longer an active part of it.
A small initiative started by a colleague and myself during our time at university. Even though we are no longer very active, some projects are still useful today.
Awesome vulnerable web applications
This is a small, but handy curated list of intentionally vulnerable web applications designed explicitly for testing purposes, particularly for automated security testing tools. It aims to provide a diverse collection of web applications deliberately crafted with vulnerabilities, allowing security professionals, researchers, and developers to thoroughly test and evaluate the efficacy of their automated security testing tools. By offering a wide range of different vulnerabilities, this regularly updated list serves as a robust testing environment to assess the detection capabilities of different security tools.
Android overlay protector
Android Overlay Protector is a mobile app designed to mitigate potential risks posed by malicious apps that use screen overlay techniques to mislead users. By detecting unauthorized overlays, it aims to enhance end-user security, by detecting attempts that trick users into granting access or interacting with sensitive content underneath the overlaid interface.
Some of my publications or public activities
Automating the detection of access control vulnerabilities in web applications
The importance of automated and reproducible security testing of web applications is growing, driven by increasing security requirements, short software development cycles, and constraints with respect to time and budget. Existing automated security testing tools are already well suited to detect some types of vulnerabilities, e.g., SQL injection or cross-site scripting vulnerabilities. However, other vulnerability types are much harder to uncover in an automated way. One important representative of this type are access control vulnerabilities, which are highly relevant in practice as they can grant unauthorized users access to security-critical data or functions in web applications. In this paper, a practical solution to automatically detect HTTP GET request-based access control vulnerabilities in web applications is presented. The solution is based on previously proposed ideas, which are extended with novel approaches to enable completely automated access control testing with minimal configuration effort, which in turn enables frequent and reproducible testing. An evaluation with seven web applications based on different technologies demonstrates the general applicability of the solution and that it can automatically uncover most access control vulnerabilities while keeping the number of false positives low.
M. Rennhard, M. Kushnir, O. Favre, D. Esposito, and V. Zahnd, “Automating the detection of access control vulnerabilities in web applications,” SN Computer Science, vol. 3, no. 5, p. 376, 2022, doi: 10.1007/s42979-022-01271-1.
Automated black box detection of HTTP GET request-based access control vulnerabilities in web applications
Automated and reproducible security testing of web applications is getting more and more important, driven by short software development cycles and constraints with respect to time and budget. Some types of vulnerabilities can already be detected reasonably well by automated security scanners, e.g., SQL injection or cross-site scripting vulnerabilities. However, other types of vulnerabilities are much harder to uncover in an automated way. This includes access control vulnerabilities, which are highly relevant in practice as they can grant unauthorized users access to security-critical data or functions in web applications. In this paper, a practical solution to automatically detect access control vulnerabilities in the context of HTTP GET requests is presented. The solution is based on previously proposed ideas, which are extended with novel approaches to enable completely automated access control testing with minimal configuration effort that enables frequent and reproducible testing. An evaluation using four web applications based on different technologies demonstrates the general applicability of the solution and that it can automatically uncover most access control vulnerabilities while keeping the number of false positives relatively low.
M. Kushnir, O. Favre, M. Rennhard, D. Esposito, and V. Zahnd, “Automated black box detection of HTTP GET request-based access control vulnerabilities in web applications,” in Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021, pp. 204–216. doi: 10.5220/0010300102040216.
Improving the effectiveness of web application vulnerability scanning
Using web application vulnerability scanners is very appealing as they promise to detect vulnerabilities with minimal configuration effort. However, using them effectively in practice is often difficult. Two of the main reasons for this are limitations with respect to crawling capabilities and problems to perform authenticated scans. In this paper, we present JARVIS, which provides technical solutions that can be applied to a wide range of vulnerability scanners to overcome these limitations and to significantly improve their effectiveness. To evaluate JARVIS, we applied it to five freely available vulnerability scanners and tested the vulnerability detection performance in the context of seven deliberately insecure web applications. A first general evaluation showed that by using the scanners with JARVIS, the number of detected vulnerabilities can be increased by more than 100% on average compared to using the scanners without JARVIS. A significant fraction of the additionally detected vulnerabilities is security-critical, which means that JARVIS provides a true security benefit. A second, more detailed evaluation focusing on SQL injection and cross-site scripting vulnerabilities revealed that JARVIS improves the vulnerability detection performance of the scanners by 167% on average, without increasing the fraction of reported false positives. This demonstrates that JARVIS not only manages to greatly improve the vulnerability detection rate of these two highly security-critical types of vulnerabilities, but also that JARVIS is very usable in practice by keeping the false positives reasonably low. Finally, as the configuration effort to use JARVIS is small and as the configuration is scanner-independent, JARVIS also supports using multiple scanners in parallel in an efficient way. In an additional evaluation, we therefore analyzed the potential and limitations of using multiple scanners in parallel. This revealed that using multiple scanners in a reasonable way is indeed beneficial as it further increases the number of detected vulnerabilities without a significant negative impact on the reported false positives.
M. Rennhard, D. Esposito, L. Ruf, and A. Wagner, “Improving the effectiveness of web application vulnerability scanning,” International Journal on Advances in Internet Technology, vol. 12, no. 1/2, pp. 12–27, Jul. 2019, doi: 10.21256/zhaw-17956.
Exploiting the potential of web application vulnerability scanning
Using automated web application vulnerability scanners so that they truly live up to their potential is difficult. Two of the main reasons for this are limitations with respect to crawling capabilities and problems to perform authenticated scans. In this paper, we present JARVIS, which provides technical solutions that can be applied to a wide range of vulnerability scanners to overcome these limitations. Our evaluation shows that by using JARVIS, the vulnerability detection performance of five freely available scanners can be improved by more than 100% compared to using them in their basic configuration. As the configuration effort to use JARVIS is small and the configurations are scanner-independent, JARVIS also allows to use multiple scanners in parallel in an efficient way. In an additional evaluation, we therefore analyzed the potential and limitations of using multiple scanners in parallel. This revealed that using multiple scanners in a reasonable way is indeed beneficial as it increases the number of detected vulnerabilities without a significant negative impact on the reported false positives.
D. Esposito, M. Rennhard, L. Ruf, and A. Wagner, “Exploiting the potential of web application vulnerability scanning,” in ICIMP 2018 - The Thirteenth International Conference on Internet Monitoring and Protection, 2018, pp. 22–29. doi: 10.21256/zhaw-3927.
Penetrationstestverfahren und Computerprogramm zum Prüfen der Vulnerabilität eines Computersystems
L. Ruf, D. Esposito, and M. Rennhard.
CVE-2020-7936
An open redirect on the login form (and possibly other places) in Plone 4.0
through 5.2.1
allows an attacker to craft a link to a Plone Site that, when followed, and possibly after login, will redirect to an attacker's site.
More vulnerabilities to be disclosed as soon as a fix is available...
Guest Lecture: External Attack Surface Management
Damiano Esposito, Migros-Genossenschafts-Bund
ZHAW School of Engineering, Information Technology Security, Zurich (Switzerland), 2023
Exploiting the Potential of Web Application Vulnerability Scanning
Damiano Esposito, Institute of Applied Information Technology (InIT)
International Academy, Research, and Industry Association (IARIA), ICIMP2018: The Thirteenth International Conference on Internet Monitoring and Protection, Barcelona (Spain), 2018
Intelligente Verwendung von automatisierten Security Testing Tools
Damiano Esposito, Institute of Applied Information Technology (InIT)
Swiss Technology Network, Communication Conference 2018, Zurich (Switzerland), 2018
Attacking Home Automation Systems
Damiano Esposito and Valentin Zahnd, Consecom AG
High-Tech Connect, 12. Cyber Intelligence, Zurich (Switzerland), 2017
Mobile Penetration Testing 101
Damiano Esposito and Valentin Zahnd, Swiss Cyber Storm
Security Interest Group Switzerland (SIGS), Mobile Hacking – all you need to know about Mobile Security, Zurich (Switzerland), 2016
Live Hacking Session - Angriff auf eine Zwei-Faktor-Authentifizierung
Damiano Esposito, Institute of Applied Information Technology (InIT)
ICTskills2016, Zurich (Switzerland), 2016
Contact and imprint
I am not interested in job offers at the moment, but I am available for inquiries regarding exciting ideas, projects or collaborations. Please feel free to use the provided contact form.
The opinions presented on this website represent solely my personal perspective and may not necessarily align with the viewpoints of others. Unless explicitly quoting someone else, the ideas expressed are exclusively my own.
© , Damiano Esposito.
This work is licensed under a Creative Commons Attribution 4.0 International License. In other words, share generously but provide attribution.