Skip to main content

Websec Cybersecurity Blog

Expert insights, trends, research findings, and best practices from our security team to help you strengthen your organization's security posture.

Featured Article

Our most important cybersecurity insight

Image unavailable
Blog October 3, 2023

A Comparison Between the Real User ID and the Effective User ID is not Enough to Prevent Privilege Escalation

In Unix-like systems, processes have a real and effective user ID determining their access permissions. While usually identical, they can differ in situations like when the setuid bit is activated in executables.

Filtering by: Topic: Tool
Image unavailable
Blog April 14, 2013

Panoptic - A tool to exploit path traversal vulnerabilities

An overview of Panoptic, an open source penetration testing tool that automates the process of search and retrieval of common log and config files through path traversal vulnerabilities.

Image unavailable
Blog June 11, 2012

Using Burp to exploit a Blind SQL Injection

How to use Burp Suite to automate the process of extracting information from a SQL database through a Blind SQL Injection.

Image unavailable
Blog January 11, 2011

mac2wepkey - Huawei default WEP generator

Huawei HG520 and HG530 routers are vulnerable to weak cipher attacks. It is possible to generate the default WEP/WPA key. The purpose of this post is to explain the process of developing a key generator for these devices.