Tags » Penetration Test

Wallarm과 Xsolla: 더 강력한 보안을 위한 협력

오늘의 포스팅에서는 기업 보안 시장의 선두주자인 Wallarm과 Xsolla의 성공적인 협력 스토리를 소개해 드리겠습니다.

이슈

Xsolla는 꾸준히 진화하고 있지만 이와 같은 성장은 때론 복잡한 문제점들을 동반하기도 합니다. 44 more words

Xsolla

Ethical Hacking and Penetration Test

By M.R.
Overall the purpose for a Penetration Test is to find vulnerabilities and threats that can put a company at risk for potential attacks. The results of the findings will allow for the implementation of solutions that will ensure a secure network infrastructure to be used by all facilities in the organization. 1,878 more words

Black Box

‘Heartbleed bug’ threatens web traffic

A flaw has been discovered in an encryption method used on about two-thirds of all websites, including Google, Amazon, Yahoo andFacebook, potentially exposing web traffic, user data and stored content to… 525 more words

Profiling Passwords

Before we begin an infrastructure penetration test it is important before we go onsite to have a customized password wordlist that will apply only to the client that we are conducting the job. 244 more words

Penetration Test

Breaking the Application with Shritam Bhowmick – Application Bruteforce Demystified.

Web Form Brute Force Methods

Demonstration by Shritam Bhowmick
Web Application Penetration Tester
Independent Consulting Security Evangelist

Abstract

This is web application penetration testing challenges hosted over pentesteracademylab.appspot.com, it reflects several challenges for web application security researchers to break in a safe environment. 4,345 more words

Adaptive Penetration Testing - Application Security

Detect an Application error messages with REGEX

Last week I try about web application error messages. I have found many useful sites and knowledge about it. First i say what is it? When you use an application (Web or Desktop) sometimes maybe you have a message from application that means it have a problem. 335 more words

Error Message

Discussing Ethical Hacking at the University of Bradford

I was invited to deliver a lecture on ethical hacking to the graduate students at the University of Bradford. We started off by discussing basic principles and approaches and concluded covering specific tools and techniques. 38 more words

Information Security