SharePoint 2013 Pentest – Part 2

So in the last post that was done a while ago, we looked at the first step in a Penetration test, “RECON“. We started to work through our plan of attack which is the following (highlighted ones covered in last post): Operating System Version Web Service Versions Installed Components Available Ports SharePoint Version SharePoint endpoints SharePoint … Continue reading SharePoint 2013 Pentest – Part 2