Select Page

Inter-Protocol Communication – Exploitation

What is it? Inter-Protocol Communication is the ability of two different protocols to exchange meaningful commands and data. These two protocols can be called the target protocol and the carrier protocol. The target protocol is the protocol on the receiving end with...

Shortcomings of following IIS security best practices

Having a secure web application is obviously in the best interest of the business. However, in many cases the developing is done without security in mind. Understandably time-to-market is an important factor for a business but a layered security approach will be more...

VMInjector – DLL Injection tool to unlock guest VMs

Overview: VMInjector is a tool designed to bypass OS login authentication screens of major operating systems running on VMware Workstation/Player, by using direct memory manipulation. Description: VMInjector is a tool which manipulates the memory of VMware guests in...

SECFORCE presented at the IGEM conference

The gas and energy sectors face significant challenges in regard to IT security. An evolving industry where reliance on IT systems has become key, being a potential target of terrorism attacks and where high availability and business continuity is a must, IT security...

FortiOS Remote Access Web Portal – XSS Vulnerability

Overview: Fortinet delivers a comprehensive portfolio of security gateways and complementary products. FortiGate platforms integrate the FortiOSâ„¢ operating system with FortiASICâ„¢ processors and the latest-generation CPUs to provide comprehensive, high-performance...