Conducting Penetration Testing: 7 Steps Are you getting the most out of your pen testing program? Does your penetrating testing services provider follow an execution standard for completeness and quality control? Winmill breaks out its pen testing services into seven phases as they are defined in the Penetration Testing Execution Standard. Read More
Padding Oracle Attack: Are You Vulnerable? In this demonstration, we will mount a cryptographic attack known as a "padding oracle attack" against a web application that uses an unauthenticated AES-CBC crypto scheme. Read More