• Oxford: +44 (0)1865 877830 
  • Manchester: +44 (0)161 713 0176 
  • Edinburgh: +44 (0)131 541 0118 
  • New York: +1 646-781-7580 
  • Bucharest: +40 316 301 707 
  • Tokyo: +81 (3) 4588 8181 

Blog

You are here

04

Oct

Using Hardware Devices to Gain Internal Access

Many organisations take external IT security very seriously, ensuring web applications are regularly penetration

03

Oct

Common Internal Vulnerabilities

There is a perception by many organisations that their internal network is a relatively safe haven from attackers. The thought is that well configured firewall rules and regular external penetration testing of internet connections provide adequate 

19

Sep

An Effective Internal Penetration Test

An effective internal Penetration Test - There is a difference between a vulnerability scan and a penetration test, where security is an on-going process.

11

Sep

A case study with Wordpress

Recently I have performed a large number of web application penetration tests against websites that use WordPress. I have found some of them quite secure and well configured but others allowed a full compromise of the WordPress administration 

30

Aug

List websites on Shared Servers using Bing API

Finding websites that are hosted on a particular IP address or that are hosted on a shared web server is a very useful part of information gathering during a penetration test.

Pages