Unencrypted Connection

Description

During the scan, Kayran managed to detect Unencrypted Connection (or, connectionss).
During the scan, Kayran was able to establish connection to an unencrypted connection. An attacker can intercept and modify data sent and received from this site.

To exploit this vulnerability, the attacker will eavesdrop the victim’s network traffic and data transfer.
This technique commonly occurs when a client communicates with the server over an insecure connection such as public Wi-Fi, or a corporate one and so on.

Recommendation

The application should use a transport-level encryption (SSL/TLS) to protect the communications being made between the client and the server.

References

https://cwe.mitre.org/data/definitions/310.html

https://cwe.mitre.org/data/definitions/319.html

https://cwe.mitre.org/data/definitions/326.html

< Return to all Vulnerabilities

Crossing Scripts – XSS

Injections. SQL Injections. Cross-site Scripting (hence the amazing title “Crossing Scripts – XSS”). There all sorts of Injection-Based attacks, if you want to read about

Read More »

Bug Bounties

As pirates, we all love plundering, we all love raiding, but mostly, we all love bounties, especially Bug Bounties. Let’s talk about it. Bug Bounties

Read More »