Resources

Research

Exploit Script for CVE-2018-13379

While conducting further analysis of the path traversal vulnerability within the FortiOS SSL VPN web portal, the team at 7 Elements created a script to enumerate vulnerable hosts and extract sensitive information such as user names and passwords. The following video shows the tool in action with the ability to scan multiple hosts (the script used […]

Read More

Information Security Assurance from a Resilience Perspective

Information Security Assurance from a Resilience Perspective White Paper Today the global business environment is more complex and interconnected than ever before. Organisations rely on electronic data as their lifeblood, and the systems that enable the storage, transport, access and manipulation of this data have become critical. Even simple spreadsheets can become mission critical systems […]

Read More

CLI Virtual Host Checker – bingip

bingip is a really simple tool that makes a request to bing.com to determine domains hosted at that IP, returning each in plain-text on a new line. It’s a very simple script at the moment and can only handle up to 50 domains (due to the page limit on Bing – we will update to use API […]

Read More

Exploring the security implications of social media

The use of social media has become a ubiquitous component of the ever more interconnected world in which we now live. The use of social media has become a ubiquitous component of the ever more interconnected world in which we now live. The use of social media platforms such as Twitter, Facebook and LinkedIn can […]

Read More

Cloud security – exploring the risks associated with use of the Cloud

As an information security professional, I am often asked about the Cloud, in particular “Is the Cloud safe?” and “Should I use the Cloud?” For me the starting point should be: “What data do I want to put in to the Cloud and how important is that data to me in terms of confidentiality, availability […]

Read More