Find out what's on our minds these days

Backdoors in Zhone GPON 2520 and Alcatel Lucent I240Q

While examining the "dropbear" binary for the Zhone GPON 2520 and Alcatel Lucent I240Q, we found that both routers have backdoors that allow users with SSH access to connect to these devices with maximum privileges.

Posted on Jan 08, 2015 by Roberto Salgado  |  tags:alcatel lucent backdoor gpon i240q zhone ssh 2520

Read full story»

Drive By ONT Botnet with IRC C&C

Demonstration of a botnet created purely by using embedded devices which are controlled remotely through vulnerabilities exploited from a webpage.

Posted on Dec 19, 2013 by Roberto Salgado  |  tags:alcatel ont botnet irc drive-by lucent command execution metasploit

Read full story»

(IN)secure session data in CodeIgniter

A security analysis on how web applications created with the PHP framework CodeIgniter handle user sessions.

Posted on Jul 04, 2013 by Roberto Salgado  |  tags:Web security session insecure CodeIgniter PHP framework

Read full story»

Panoptic - A tool to exploit path traversal vulnerabilities

An overview of Panoptic, an open source penetration testing tool that automates the process of search and retrieval of common log and config files through path traversal vulnerabilities.

Posted on Apr 04, 2013 by Roberto Salgado  |  tags:tool path traversal python lfi panoptic

Read full story»

Backdoor In Optical Fiber Device Alcatel-Lucent

The newest optical fiber devices offered by the ISP Infinitum have a backdoor which allow for full administration of these devices. This backdoor account is hidden by nature and does not allow for the password to be changed.

Posted on Dec 06, 2012 by Roberto Salgado  |  tags:alcatel lucent backdoor router

Read full story»

Latest Blog Entries

Belkin Wemo Switch NMap Scripts
Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.