willem.com

People pay me to hack their hosting

Considering open ports and unused network facing services

Feb. 28, 2019 -

People pay me to hack them, provided I'll explain how it was done, so future hacks can be prevented. As security consultant, I scan for weaknesses in my clients' apps, webshops and websites. Very often a hack starts by exploiting a security hole that is visible remotely. Read along to learn how hackers find security holes and what you can do to secure them.

Continue reading
A typical server in the datacenter, a physical machine that can host apps, webshops and websites
A typical server in the datacenter, a physical machine that can host apps, webshops and websites
Different kinds of hosting: Shared hosting, VPS hosting and dedicated hosting visualised (a circle representing a physical server)
Different kinds of hosting: Shared hosting, VPS hosting and dedicated hosting visualised (a circle representing a physical server)
Contagious effect of an hacked website (red indicating trouble)
Contagious effect of an hacked website (red indicating trouble)
Once a hacker knows what software your website uses, its easy to lookup known security holes using databases like cvedetails.com
Once a hacker knows what software your website uses, its easy to lookup known security holes using databases like cvedetails.com
Using nmap to scan a hosting server, identifying network facing services and open ports
Using nmap to scan a hosting server, identifying network facing services and open ports
Keep in mind that help is available - I know my way around servers and cyber security
Keep in mind that help is available - I know my way around servers and cyber security

Other stories

all blog posts

Tagged

CloudCyber SecurityDataHackingFree SoftwareNetworkingProgrammingServerWebdesign

Articles (153)