Agathoklis Prodromou, Author at Acunetix https://www.acunetix.com/blog/author/aprodromou/ Is Your Website Hackable? Tue, 02 Apr 2024 05:22:58 +0000 en-US hourly 1 An Introduction to Web Shells (Web Shells Part 1) https://www.acunetix.com/blog/articles/introduction-web-shells-part-1/ Thu, 16 Apr 2020 06:00:24 +0000 https://www.acunetix.com/?p=16392 A web shell is a malicious script used by an attacker with the intent to escalate and maintain persistent access on an already compromised web application. A web shell itself cannot attack or exploit a remote vulnerability, so it is always the second step of...

Read more

The post An Introduction to Web Shells (Web Shells Part 1) appeared first on Acunetix.

]]>
Web Shells 101 Using PHP (Web Shells Part 2) https://www.acunetix.com/blog/articles/web-shells-101-using-php-introduction-web-shells-part-2/ Tue, 14 Apr 2020 08:03:09 +0000 https://www.acunetix.com/?p=16393 In part 1 of this series, we looked at what a web shell is and why an attacker would seek to use one. In part 2 of this series, we’ll be looking at some specific examples of web shells developed using the PHP programming language....

Read more

The post Web Shells 101 Using PHP (Web Shells Part 2) appeared first on Acunetix.

]]>
Keeping Web Shells Under Cover (Web Shells Part 3) https://www.acunetix.com/blog/articles/keeping-web-shells-undercover-an-introduction-to-web-shells-part-3/ Tue, 14 Apr 2020 08:02:11 +0000 https://www.acunetix.com/?p=16397 In part 2 of this series, we looked at specific examples of web shells in the PHP programming language. In part 3 of this series, we’ll be looking at some techniques that attackers use to keep web shells hidden. Commands can be sent to the...

Read more

The post Keeping Web Shells Under Cover (Web Shells Part 3) appeared first on Acunetix.

]]>
Web Shells in Action (Web Shells Part 4) https://www.acunetix.com/blog/articles/web-shells-action-introduction-web-shells-part-4/ Tue, 14 Apr 2020 08:01:06 +0000 https://www.acunetix.com/?p=16412 In part 3 of this series, we looked at ways in which a hacker can keep web shells under the radar. In part 4 of this series, we’ll be looking at web shells in action by using Weevely as an example. Weevely is a lightweight...

Read more

The post Web Shells in Action (Web Shells Part 4) appeared first on Acunetix.

]]>
Web Shell Detection and Prevention (Web Shells Part 5) https://www.acunetix.com/blog/articles/detection-prevention-introduction-web-shells-part-5/ Tue, 14 Apr 2020 08:00:26 +0000 https://www.acunetix.com/?p=16413 In part 4 of this series, we looked at web shells in action by using Weevely as an example. In the final part of this series, we’ll be looking at web shell detection and how to prevent their use. Detection If an administrator suspects that a...

Read more

The post Web Shell Detection and Prevention (Web Shells Part 5) appeared first on Acunetix.

]]>
Using Logs to Investigate – SQL Injection Attack Example https://www.acunetix.com/blog/articles/using-logs-to-investigate-a-web-application-attack/ Thu, 03 Oct 2019 07:00:17 +0000 https://www.acunetix.com/?p=16304 A log file is an extremely valuable piece of information that is provided by a server. Almost all servers, services, and applications provide some sort of logging. A log file records events and actions that take place during the run time of a service or...

Read more

The post Using Logs to Investigate – SQL Injection Attack Example appeared first on Acunetix.

]]>
TLS Security 1: What Is SSL/TLS https://www.acunetix.com/blog/articles/tls-security-what-is-tls-ssl-part-1/ Wed, 03 Apr 2019 07:30:45 +0000 https://www.acunetix.com/?p=16792 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic security protocols. They are used to make sure that network communication is secure. Their main goals are to provide data integrity and communication privacy. The SSL protocol was the first protocol designed for this...

Read more

The post TLS Security 1: What Is SSL/TLS appeared first on Acunetix.

]]>
TLS Security 5: Establishing a TLS Connection https://www.acunetix.com/blog/articles/establishing-tls-ssl-connection-part-5/ Sun, 31 Mar 2019 11:39:54 +0000 https://www.acunetix.com/?p=16819 The process of establishing a secure SSL/TLS connection involves several steps. SSL/TLS security protocols use a combination of asymmetric and symmetric encryption. The client and the server must negotiate the algorithms used and exchange key information. For the purpose of explaining this complex process, we...

Read more

The post TLS Security 5: Establishing a TLS Connection appeared first on Acunetix.

]]>
TLS Security 4: SSL/TLS Certificates https://www.acunetix.com/blog/articles/tls-ssl-certificates-part-4/ Sun, 31 Mar 2019 10:14:35 +0000 https://www.acunetix.com/?p=16810 When you communicate securely with a third party using data encryption, you usually want to be sure that they are who they say they are. For example, when you use an online bank or an e-commerce site and you send sensitive information, you want to...

Read more

The post TLS Security 4: SSL/TLS Certificates appeared first on Acunetix.

]]>