Reverse Proxy Bypass – Bug in Apache mod_proxy
Wednesday, October 5th, 2011It is possible for an attacker to reach internal resources in a DMZ if RewriteRule or ProxyPassMatch directives are used in mod_proxy config
It is possible for an attacker to reach internal resources in a DMZ if RewriteRule or ProxyPassMatch directives are used in mod_proxy config
Posted in apache, bug, mod_proxy, rewrite, Security, vulnerability, vulns | Comments Off | permalink
It is possible for an attacker to reach internal resources in a DMZ if RewriteRule or ProxyPassMatch directives are used in mod_proxy config
Posted in apache, bug, mod_proxy, rewrite, Security, vulnerability, vulns | Comments Off | permalink
read this if you need to conduct pen and security testing on / from EC2 instances
Posted in amazon, aws, cloud, ec2, infosec, policy, Security, vulnerability | Comments Off | permalink
Posted in amazon, aws, cloud, ec2, infosec, policy, Security, vulnerability | Comments Off | permalink
exellent explanation for the much-hyped Dan Kaminsky DNS vuln. This is for people for whom word “DNS” sounds like it’s in elvish
Posted in network, reference, Security, sysadmin, vulnerability | Comments Off | permalink
You are currently browsing the archives for the vulnerability category.
Konstantin Antselovich (c) 2004-2011
powered by WordPress
Entries (RSS)
and Comments (RSS).