Development configuration files


Kayran managed to locate configuration files.

Bussines Impact

These files may disclose sensitive information. This information can be used and assist in launching targeted attacks.


Remove or deny access to all configuration files that are accessible from the internet.

More Details

Attackers can find unreferenced or forgotten files that can be used to obtain important information about the infrastructure or the credentials.


Man-In-The-Middle Attacks

Do you know these people who just push themselves into conversations?That’s Man-In-The-Middle Attacks. And from a wider angle, Man-In-The-Middle Attacks, or MITM, are built around

Read More »