Pentest Report - ECSA
Document Details
Version History
Contact
Executive Summary
Target Systems
Timeline
Comprehensive Technical Report
Vulnerability Assessment
Challenges
[Challenge 1:] Network Scanning & Service Enumeration
[Challenge 2:] Microsoft Server Service Relative Path Stack Corruption
Risk Information
References
[Challenge 3:] Bash Remote Code Execution
Risk Information
References
[Challenge 4:] Weak Port Hardening
[Challenge 5:] freeSSHd SFTP Authentication Bypass vulnerability
Risk Information
References
[Challenge 6:] SQL Injection & XSS Attack
[Challenge 7:] Wordpress Plugin - Cross-Site Request Forgery (CSRF)
References
[Challenge 8:] SMB Psexec Vulnerability
Risk Information
References
[Challenge 9:] SQL Injection Vulnerability
Risk Information
References
[Challenge 10:] MySQL Password Bypass Vulnerability
Risk Information
References
[Challenge 11:] Joomla Media Manager File Upload Vulnerability
Risk Information
References
Powered by
GitBook
Risk Information
Risk Information
results matching "
"
No results matching "
"