Potentially bypassing the security controls of the target site. If for example, your primary target web site appears to be secure, you may be able to gain access to the underlying operating system by attacking a less secure site on the same server. It is also common in many organizations and can be an excellent way to expand the attack surface during reconnaissance of a web server. This is a common technique in shared hosting environments.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |