up the time needed to find any potential vulnerabilities in said application.
In this paper, we discuss how you can ”hide” information about your back-end application through various
methods, to hinder an attacker to be able to gather useful information through reconnaissance and to reduce your publicly accessible attack surface.
Written by: Mathias Gam-Pedersen, IT-Security Consultant
Hvad kan ReTest tilbyde?
Bliv klogere på hvad ReTest kan hjælpe med indenfor it sikkerhed og hvilke services vi tilbyder
Seneste kommentarer