Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.
credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.
New publication: Mastering the Nmap Scripting Engine
We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".
Presentation on Optimization and Obfuscation Techniques for SQL Injections
A couple years ago Roberto Salgado had the honor of presenting his research on SQL Injections at several conferences. Just recently, Blackhat released the video of his presentation. This post contains the link to Roberto's slides and video.
Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.
BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.
A penetration test simulates an attack from outside and provides a rigorous examination of potential and actual vulnerabilities, including software flaws, faulty system configurations, insufficiently robust countermeasures, and more.
Don't wait until it's too late – if an actual attack is your first penetration test, the losses you sustain will be all too real!
A source code audit is a systematic examination of the source code of your Web application, in order to reveal vulnerabilities that can lead to potentially debilitating breaches of security, whether accidental or malicious in nature.
A Websec source code vulnerability audit is the first line of defense in keeping you safe and secure.
When your network suffers an attack, you need to know as soon as possible – any delay can result in a data breach, damage to your network, and losses that could prove to be catastrophic.
The automatic detection abilities of a monitoring service can provide the difference between stopping an attack as it happens, and being vulnerable to a huge loss.
Simple employee negligence accounts for nearly nine in ten occurrences of data breach in the workplace. An innocent mistake can result in massive losses, not only of money or data, but corporate reputation and customer loyalty.
Network security is too important to leave to chance, get your employees trained in security awareness today.