Development configuration files


During the scan, Kayran managed to locate configuration files that are, or were, used in development.

These files might disclose sensitive, valuable information. This information can be used to assist attackers in launching targeted attacks.

For example, attackers can find “unreferenced” or forgotten configuration files that can be used to obtain important information about the site’s infrastructure. Information such as the credentials being used and so on.


Remove or deny access to all configuration files that are accessible through the internet.
Make sure only the right people have access to these files.


< Return to all Vulnerabilities

Using VPN

What is a VPN? Why should someone be using VPN? Which Problems does is solve? and what is the advantages and disadvantages of it? Let’s

Read More »

The Cloud

I’m pretty sure there isn’t a single adult in the world who hasn’t at least heard of The Cloud. Explaining “The Cloud” in 2022 may

Read More »