Latest Blog Entries

New publication: Mastering the Nmap Scripting Engine
We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Presentation on Optimization and Obfuscation Techniques for SQL Injections
A couple years ago Roberto Salgado had the honor of presenting his research on SQL Injections at several conferences. Just recently, Blackhat released the video of his presentation. This post contains the link to Roberto's slides and video.

Backdoors in Zhone GPON 2520 and Alcatel Lucent I240Q
While examining the "dropbear" binary for the Zhone GPON 2520 and Alcatel Lucent I240Q, we found that both routers have backdoors that allow users with SSH access to connect to these devices with maximum privileges.

Drive By ONT Botnet with IRC C&C
Demonstration of a botnet created purely by using embedded devices which are controlled remotely through vulnerabilities exploited from a webpage.

Latest News

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.

Websec present at Campus Party 2014
Websec will be participating with four conferences at the largest Campus Party ever held, which will take place from the 24-29 of June in Guadalajara, Mexico.


Penetration Services

A penetration test simulates an attack from outside and provides a rigorous examination of potential and actual vulnerabilities, including software flaws, faulty system configurations, insufficiently robust countermeasures, and more.

Don't wait until it's too late – if an actual attack is your first penetration test, the losses you sustain will be all too real!

Read more

Source Code Auditing

A source code audit is a systematic examination of the source code of your Web application, in order to reveal vulnerabilities that can lead to potentially debilitating breaches of security, whether accidental or malicious in nature.

A Websec source code vulnerability audit is the first line of defense in keeping you safe and secure.

Read more

Security Monitoring

When your network suffers an attack, you need to know as soon as possible – any delay can result in a data breach, damage to your network, and losses that could prove to be catastrophic.

The automatic detection abilities of a monitoring service can provide the difference between stopping an attack as it happens, and being vulnerable to a huge loss.

Read more

Enterprise Training

Simple employee negligence accounts for nearly nine in ten occurrences of data breach in the workplace. An innocent mistake can result in massive losses, not only of money or data, but corporate reputation and customer loyalty.

Network security is too important to leave to chance, get your employees trained in security awareness today.

Read more