SharePoint 2013 Pentest – Part 2
So in the last post that was done a while ago, we looked at the first step in a Penetration test, “RECON“. We started to work through our plan of attack which is the following (highlighted ones covered in last post): Operating System Version Web Service Versions Installed Components Available Ports SharePoint Version SharePoint endpoints SharePoint … Continue reading SharePoint 2013 Pentest – Part 2
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed