Sunday, 30 August 2020

CEH Practical: Information-Gathering Methodology

 Information gathering can be broken into seven logical steps. Footprinting is performed during the first two steps of unearthing initial information and locating the network range. FootprintingFootprinting is defined as the process of establishing a scenario or creating a map of an organization's network and systems. Information gathering...
Read More :- "CEH Practical: Information-Gathering Methodology"

CVE-2020-2655 JSSE Client Authentication Bypass

During our joint research on DTLS state machines, we discovered a really interesting vulnerability (CVE-2020-2655) in the recent versions of Sun JSSE (Java 11, 13). Interestingly, the vulnerability does not only affect DTLS implementations but does also affects the TLS implementation of JSSE in a similar way. The vulnerability allows an attacker...
Read More :- "CVE-2020-2655 JSSE Client Authentication Bypass"