Close

HAVE QUESTIONS?

A partner account manager can help. Contact us today.

 Subscribe me to your mailing list

Penetration: from application down to OS. Getting OS access using IBM Websphere Application Server vulnerabilities

This whitepaper opens a series of publications describing various ways of obtaining access to the server operating system, using vulnerabilities in popular business applications which meet in the corporate environment.

Author: Stanislav Svistunovich

In this article describes ways of obtaining access to the server operating system through vulnerabilities in IBM Websphere application server.

Penetration from application down to OS (IBM Websphere).pdf