Open Mobile Menu

Blog

Filed In: Network Security, Security Testing

Web Application Enumeration at Scale

Stephen Haywood

Written By: Stephen Haywood

December 07, 2018

Views: 236

When we conduct network penetration tests, we often find that the majority of accessible services are web applications. Often times, these web applications have administrative interfaces with weak/default passwords or have vulnerabilities that allow us to access sensitive data or even allow arbitrary execution of code.

Read more.

Kali in EC2 with Docker

Stephen Haywood

Written By: Stephen Haywood

October 13, 2016

Views: 3837

We often have a need to run a Kali image in an EC2 environment and Offensive Security no longer maintains a Kali AMI...

Read more.

Making Jetty Bleed

Stephen Haywood

Written By: Stephen Haywood

October 06, 2016

Views: 13599

The other day I was running a Nessus scan against a client and saw Plugin ID 81576 (Jetty HttpParser Error Remote Memory Disclosure).

Read more.