Find out what's on our minds these days

Optimized Blind MySQL Injection Data Retrieval

Demonstrates a method to extract data from a MySQL database using blind injection in fewer requests than currently known techniques such as the Bisection and Bit Shift method.

Posted on Mar 31, 2011 by Roberto Salgado  |  tags:MySQL Database SQL Injection Blind Injection

Read full story»

mac2wepkey - Huawei default WEP generator

Huawei HG520 and HG530 routers are vulnerable to weak cipher attacks. It is possible to generate the default WEP/WPA key. The purpose of this post is to explain the process of developing a key generator for these devices.

Posted on Jan 19, 2011 by Pedro Joaquin  |  tags:mac2wepkey huawei echolife home gateway hg520 hg530 wep generator

Read full story»

Attacking Linksys WRT160N router using the "URL Obfuscation in Frames" bug

Using the "URL Obfuscation in Frames" bug to enable remote administration on a Linksys WRT160N router

Posted on Aug 26, 2010 by Roberto Salgado  |  tags:linksys wrt160n routers url obfuscation basic auth default password

Read full story»

Do not trust your browser's status bar

Many people rely on the status bar for checking the destination of links, but it has been proven before that it is easy to falsify.

Posted on Jul 24, 2010 by Pedro Joaquin  |  tags:phishing status bar spoofing scam

Read full story»

egrepping mod_security logs

Useful commands to extract information from your mod_security logs

Posted on May 22, 2010 by Paulino Calderon  |  tags:mod_security security logs

Read full story»

Latest Blog Entries

Belkin Wemo Switch NMap Scripts
Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.