Categories • Page 6/6Security researchHere’s where our security researchers analyze and share insights about the latest vulnerabilities, providing details on how they work, or how to exploit them. Exploiting SQL Injection in Magento Using SqlmapIn this article we show a new method of exploiting the critical SQL Injection vulnerability in Magento (CVE-2019-7139), using the well known SQLMap tool.Author(s)Alexandru PostolachePublished at14 Jun 2019Updated at29 Apr 2024Analysis of a WordPress Remote Code Execution attackThis article shows our analysis of a known attack (presented in February 2019) against WordPress versions 5.0.0 and lower, awarding an intruder with arbitrary code execution on the webserver. The article covers each exploitation step and HTTP request required for a successful attack.Author(s)Razvan IonescuPublished at21 May 2019Updated at30 Apr 2024Exploiting OGNL Injection in Apache StrutsLet’s understand how OGNL Injection works in Apache Struts. We’ll exemplify with two critical vulnerabilities in Struts: CVE-2017-5638 (Equifax breach) and CVE-2018-11776.Author(s)Ionuț PopescuPublished at14 Mar 2019Updated at29 Apr 2024Inside Nmap, the world’s most famous port scannerThis article is a deep dive into how Nmap works, to understand its internal structure, and to master its functionality.Author(s)Satyam SinghPublished at08 Jan 2019Updated at17 Jul 2023Essential HTTP Headers for securing your web serverIn this article, we discuss the most important HTTP headers that you should configure on your web server in order to improve its security.Author(s)Satyam SinghPublished at22 Oct 2018Updated at29 Apr 2024123456
Exploiting SQL Injection in Magento Using SqlmapIn this article we show a new method of exploiting the critical SQL Injection vulnerability in Magento (CVE-2019-7139), using the well known SQLMap tool.Author(s)Alexandru PostolachePublished at14 Jun 2019Updated at29 Apr 2024
Analysis of a WordPress Remote Code Execution attackThis article shows our analysis of a known attack (presented in February 2019) against WordPress versions 5.0.0 and lower, awarding an intruder with arbitrary code execution on the webserver. The article covers each exploitation step and HTTP request required for a successful attack.Author(s)Razvan IonescuPublished at21 May 2019Updated at30 Apr 2024
Exploiting OGNL Injection in Apache StrutsLet’s understand how OGNL Injection works in Apache Struts. We’ll exemplify with two critical vulnerabilities in Struts: CVE-2017-5638 (Equifax breach) and CVE-2018-11776.Author(s)Ionuț PopescuPublished at14 Mar 2019Updated at29 Apr 2024
Inside Nmap, the world’s most famous port scannerThis article is a deep dive into how Nmap works, to understand its internal structure, and to master its functionality.Author(s)Satyam SinghPublished at08 Jan 2019Updated at17 Jul 2023
Essential HTTP Headers for securing your web serverIn this article, we discuss the most important HTTP headers that you should configure on your web server in order to improve its security.Author(s)Satyam SinghPublished at22 Oct 2018Updated at29 Apr 2024