Lessons Learned

  • Cronjobs can be from other application, pay attention to these

  • SQL injections can be found on older application login forms

  • DNS zone transfering is important! This can give an attacker acess to different domains that they should not have access to.

Last updated

Was this helpful?