Skip to main content

Websec Cybersecurity Blog

Expert insights, trends, research findings, and best practices from our security team to help you strengthen your organization's security posture.

Image unavailable
Blog December 19, 2013

Drive By ONT Botnet with IRC C&C

Demonstration of a botnet created purely by using embedded devices which are controlled remotely through vulnerabilities exploited from a webpage.

Image unavailable
Blog July 4, 2013

(IN)secure session data in CodeIgniter

A security analysis on how web applications created with the PHP framework CodeIgniter handle user sessions.

Image unavailable
Blog April 14, 2013

Panoptic - A tool to exploit path traversal vulnerabilities

An overview of Panoptic, an open source penetration testing tool that automates the process of search and retrieval of common log and config files through path traversal vulnerabilities.

Image unavailable
Blog December 2, 2012

Backdoor In Optical Fiber Device Alcatel-Lucent

The newest optical fiber devices offered by the ISP Infinitum have a backdoor which allow for full administration of these devices. This backdoor account is hidden by nature and does not allow for the password to be changed.

Image unavailable
Blog September 6, 2012

Mac2WepKey HHG5xx for iPhone

The famous app to obtain the default WiFi passwords for Huawei routers is now available for the iPhone iOS 5.