Penetration: from application down to OS. Getting OS access using IBM Websphere Application Server vulnerabilities
This whitepaper opens a series of publications describing various ways of obtaining access to the server operating system, using vulnerabilities in popular business applications which meet in the corporate environment.
Author: Stanislav Svistunovich
In this article describes ways of obtaining access to the server operating system through vulnerabilities in IBM Websphere application server.[styled_link link=’/wp-content/uploads/pub/Penetration%20from%20application%20down%20to%20OS%20(IBM%20Websphere).pdf’ type=’attachment’]Penetration from application down to OS (IBM Websphere).pdf[/styled_link]