A possible attack path during a penetration test is having access to the administrative console of a JAVA Application Server (like WAS, JBOSS and Tomcat) installed on a Windows server with default or guessable (e.g. through brute-force) administrative credentials.
Operational security requires a continuous process of awareness, preparedness and readiness. It is a highly demanding, cross-domain activity that requires effective communication and coordination between people that often have different knowledge and perspective for information security within the organization. It is neither a fixed cost nor a fixed duration project; rather an on-going business program with strategy, plans, objectives and stakeholders.
SWORDFISH enables our clients to dynamically manage their security framework, enforce management, operational and technology security controls, assess compliance with regulations, policies and standards, and analyze our risks in real time. All under a single console.
This is the 2nd part, out of 2 blog articles, which demonstrate some tips and techniques (T&T) for client side penetration tests. The previous article included tips and techniques on how to deliver spoofed emails without being blocked. This article includes techniques on how to embed an executable file within attachable files, without being detected by mail filters and anti-virus.