Open Mobile Menu

Blog

Filed In: Network Security, Security Testing

Web Application Enumeration at Scale

Stephen Haywood

Written By: Stephen Haywood

December 07, 2018

Views: 240

When we conduct network penetration tests, we often find that the majority of accessible services are web applications. Often times, these web applications have administrative interfaces with weak/default passwords or have vulnerabilities that allow us to access sensitive data or even allow arbitrary execution of code.

Read more.

Filed In: Security Testing, Application Security

Securing Third Party JavaScript

Jeremy Mount

Written By: Jeremy Mount

August 20, 2018

Views: 947

Many, if not most web applications use some kind of third party JavaScript. These scripts provide useful functionality and services such as analytics, social media integration, data services, user interface features, chat capabilities and so on, however they also present a substantial risk to the confidentiality and integrity of your application and the data contained within. This is not a new topic in application security, however many companies still fail to consider or fully understand the security implications of adding code from third parties to their applications.

Read more.

Filed In: Security Testing, Security

Hardware Design: Dangers of User Accessible Ports

Brandon Wilson

Written By: Brandon Wilson

July 09, 2018

Views: 634

Generally, it is a mistake for a web application to have an open and publicly accessible administrative interface – particularly one that does not require credentials in order to use. This principle is just as applicable to hardware designs as it is to application designs.

Read more.