WebApp Sec mailing list archives
Username enumeration vulnerabilities
From: Adrian Pastor <adrian.pastor () procheckup com>
Date: Thu, 05 Apr 2007 11:09:07 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The following post discusses username enumeration vulnerabilities within the context of webapps pentesting. We hope you find it useful: http://www.gnucitizen.org/blog/username-enumeration-vulnerabilities -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGFMrDUmN3xwbmU6YRAtGhAJ43fHiDSXawumyPsHxkWPn9f+Wa9gCggYVW SJcAa94/uTpTLRI6vRjrYkg= =90B7 -----END PGP SIGNATURE----- ------------------------------------------------------------------------- Sponsored by: Watchfire It's been reported that 75% of websites are vulnerable to attack. That's because hackers know to exploit weaknesses in web applications. Traditional approaches to securing these assets no longer apply. Download the "Addressing Challenges in Application Security" whitepaper today, and see for yourself. https://www.watchfire.com/securearea/whitepapers.aspx?id=701500000008fHF --------------------------------------------------------------------------
Current thread:
- Username enumeration vulnerabilities Adrian Pastor (Apr 05)