Close

HAVE QUESTIONS?

Contact us today.

Subscribe me to your mailing list

Penetration: from application down to OS. Getting OS access using IBM Websphere Application Server vulnerabilities

Websphere

This whitepaper opens a series of publications describing various ways of obtaining access to the server operating system, using vulnerabilities in popular business applications which meet in the corporate environment.

Author: Stanislav Svistunovich

In this article describes ways of obtaining access to the server operating system through vulnerabilities in IBM Websphere application server.

[styled_link link=’/wp-content/uploads/pub/Penetration%20from%20application%20down%20to%20OS%20(IBM%20Websphere).pdf’ type=’attachment’]Penetration from application down to OS (IBM Websphere).pdf[/styled_link]