Security G33k

a bookworm who loves cyber security. a sucker for hacker and security conferences. loves attending and promoting conferences and has spoken at multiple conferences globally (almost). interests include cyber threat intelligence, cyber 'warfare', cyber 'terrorism' and cyber conflict.

Showing posts with label qualys. Show all posts
Showing posts with label qualys. Show all posts
Saturday, 8 February 2014

XSS (Cross Site Scripting) Vulnerability Found in Dell.com

›
According to OWASP, Cross-Site Scripting (XSS) attacks are a type of injection problem, in which malicious scripts are injected into the oth...
Monday, 9 December 2013

Microsoft Windows Remote Desktop Protocol Remote Code Execution Vulnerability (MS12-020) - Validating the Findings

›
Results from Qualys Scan ISSUE: Microsoft Windows Remote Desktop Protocol Remote Code Execution Vulnerability (MS12-020) THREAT: ...
Wednesday, 4 December 2013

SSL/TLS use of Weak RC4 cipher - Validating the Findings

›
Results from Qualys Scan ISSUE: - SSL/TLS use of weak RC4 cipher THREAT: Secure Sockets Layer (SSL v2/v3) and Transport Layer Secu...
Tuesday, 6 August 2013

Windows Remote Desktop Protocol Weak Encryption Method Allowed - Validating the Findings

›
Results from Qualys Scan ISSUE: -Windows Remote Desktop Protocol Weak Encryption Method Allowed THREAT: Remote Desktop Protocol is a ...
2 comments:
Sunday, 30 June 2013

SSLv2 Depreciated Protocol - Validating the Findings

›
In this post, we will look at some tools used to analyze whether the web server is using SSL version 2. SSLv2 Depereciated Protocol a...
›
Home
View web version

About The Nerd

TheGoodGeek
Graduated with a BSc Degree in Cyber Forensics, Information Security Management and Business Information Systems. A sucker for Security and Hackers Conferences. A Bookworm for Hacking and Cyber War related books.
View my complete profile
Powered by Blogger.