Websec Cybersecurity Blog
Expert insights, trends, research findings, and best practices from our security team to help you strengthen your organization's security posture.
Featured Article
Our most important cybersecurity insight
A Comparison Between the Real User ID and the Effective User ID is not Enough to Prevent Privilege Escalation
In Unix-like systems, processes have a real and effective user ID determining their access permissions. While usually identical, they can differ in situations like when the setuid bit is activated in executables.
Three Non Web-based XSS Injections
In this post guest blogger Alejandro Hernandez (nitr0us) writes about some interesting and fun XSS vectors which are not commonly seen.
Cookie Stealing By Router Pharming (2Wire)
Multiple stage exploit used to obtain cookies of many domains by exploiting several vulnerabilities on 2Wire routers.
Attacking Linksys WRT160N router using the "URL Obfuscation in Frames" bug
Using the "URL Obfuscation in Frames" bug to enable remote administration on a Linksys WRT160N router