JSON Web Token Attacks And Vulnerabilities

JSON Web Tokens (JWTs) are a widely used method for securely exchanging data in JSON format. Due to their ability to be digitally signed and verified, they are commonly used for authorization and authentication. However, their security depends entirely on proper implementation—when misconfigured, JWTs can…
Read more
The post JSON Web Token Attacks And Vulnerabilities appeared first on Acunetix.

Read More

IP Disclosure of Servers Behind WAFs Using WordPress XML-RPC

The XML-RPC protocol was originally designed to simplify cross-platform communication between applications. However, recent security research has revealed that it can be exploited for IP disclosure attacks. This article explores how XML-RPC functions, its vulnerabilities in WordPress, and how attackers can use it to expose…
Read more
The post IP Disclosure of Servers Behind WAFs Using WordPress XML-RPC appeared first on Acunetix.

Read More

Identifying WordPress Websites On Local Networks (behind Firewalls) and Bruteforcing the Login Pages

This article explores how attackers can leverage the XSHM attack to detect WordPress sites operating within internal networks or behind firewalls. It also demonstrates how this method can be used to carry out brute-force login attempts on these protected installations. According to statistics from w3techs,…
Read more
The post Identifying WordPress Websites On Local Networks (behind Firewalls) and Bruteforcing the Login Pages appeared first on Acunetix.

Read More
X