Back to photostream

insufficient attack protection

It is natural behaviour for most attackers targeting an application to perform extensive research about the application, its services and categories of users accessing the application. The research usually starts with an ‘information gathering’ phase which includes collecting information about the application stack and usernames that are available to any random user who has access to the application, in addition to observing contact-us forms’ structures.

For more details: blog.entersoftsecurity.com/entersoft-vulnerability-overvi...

 

228 views
0 faves
0 comments
Uploaded on July 4, 2017