Skip to main content

Websec Cybersecurity Blog

Expert insights, trends, research findings, and best practices from our security team to help you strengthen your organization's security posture.

Featured Article

Our most important cybersecurity insight

Image unavailable
Blog October 3, 2023

A Comparison Between the Real User ID and the Effective User ID is not Enough to Prevent Privilege Escalation

In Unix-like systems, processes have a real and effective user ID determining their access permissions. While usually identical, they can differ in situations like when the setuid bit is activated in executables.

Filtering by: Topic: Nmap
Image unavailable
Blog December 14, 2018

Ncrack and Nmap NSE development for offense and defense - DEFCON CHINA

Paulino Calderon (@calderpwn) represented Websec in the first edition in China of the world-renowned DEFCON event. Here we share all the material of your workshop.

Image unavailable
Blog June 23, 2017

Belkin Wemo Switch NMap Scripts

Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Image unavailable
Blog November 29, 2016

New publication: Mastering the Nmap Scripting Engine

We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Image unavailable
Blog May 27, 2012

Remote credential and configuration disclosure of Huawei HG5XX devices using Nmap.

A new NSE script called "http-huawei-hg5xx-vuln" has been added to Nmap which exploits a couple of vulnerabilities found in Huawei HG5XX modems.

Image unavailable
Blog May 24, 2012

Detecting and exploiting vulnerable PHP-CGI applications

A critical vulnerability affecting PHP applications which use the CGI interprerter was published which allows attackers to view the source code and execute code remotely.