Myth or reality? This paper at imperva.com shows how relatively simple techniques can be used to automatically find and attack vulnerable application servers. Looks plausible enough to me.
You’ve been warned: use a serious framework for your next project ;-)
This entry was posted on Wednesday, March 31st, 2004 at 8:00 am and is filed under The Web. You can follow any responses to this entry through the RSS 2.0 feed.
Both comments and pings are currently closed.
cat myself | sort | head -2
Bertrand Delacrétaz here - my "résumé" will tell you more.
The opinions expressed here are my own, I'm not representing any group or company on this blog. YMMV.