RedShift Consulting showcase Acunetix at International Cybersecurity Conference in Lisbon, Portugal

RedShift Consulting recently showcased Acunetix at the 2nd NATO Cyber Defense – Smart Defense Projects (CD SDP) Conference and at the 10th International Symposium of National Strategy on cyber security and cyber defense held on 28th and 29th April 2016 respectively, at the Military Academy (Amadora), Lisbon, Portugal. The CD SDP Conference was held in order to enhance the development of synergies […]

Read More →

Why is Source Code Disclosure dangerous?

Source code often contains some form of sensitive information—whether it be configuration related information (e.g. database credentials) or simply information on how the web application functions. If disclosed, such information can potentially be used by an attacker to discover logical flaws and escalate into a subsequent chain of attacks which would not be possible without […]

Read More →

An Introduction to Web-shells – Part 1

A web-shell is a malicious script used by an attacker with the intent to escalate and maintain persistent access on an already compromised web application. A web-shell itself cannot attack or exploit a remote vulnerability, so it is always the second step of an attack (this stage is also referred to as post-exploitation). An attacker […]

Read More →