Skip to main content

Websec Cybersecurity Blog

Expert insights, trends, research findings, and best practices from our security team to help you strengthen your organization's security posture.

Image unavailable
Blog November 20, 2018

Launching replay attacks against the Wells Fargo Wallet service

The Wells Fargo Wallet service is susceptible to replay attacks, where an attacker may intercept a transaction through an altered PoS or fake terminal, steal the sensitive token, and replay the token later.

Image unavailable
Blog December 19, 2017

Three Non Web-based XSS Injections

In this post guest blogger Alejandro Hernandez (nitr0us) writes about some interesting and fun XSS vectors which are not commonly seen.

Image unavailable
Blog June 23, 2017

Belkin Wemo Switch NMap Scripts

Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Image unavailable
Blog November 29, 2016

New publication: Mastering the Nmap Scripting Engine

We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Image unavailable
Blog February 19, 2016

Downloading an Application's Entire Source Code Through an Exposed GIT Directory

Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

Image unavailable
Blog January 8, 2015

Backdoors in Zhone GPON 2520 and Alcatel Lucent I240Q

While examining the "dropbear" binary for the Zhone GPON 2520 and Alcatel Lucent I240Q, we found that both routers have backdoors that allow users with SSH access to connect to these devices with maximum privileges.