Help
RSS
API
Feed
Maltego
Contact
Domain > blog.includesecurity.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2014-07-17
64.233.183.121
(
ClassC
)
2014-07-19
74.125.198.121
(
ClassC
)
2024-07-13
192.0.78.20
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginxDate: Sat, 13 Jul 2024 12:27:19 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveLocation: https://blog.includesecurity.com/X-ac: 2.sea _atomic_bur BYPASSAlt-Svc: h3:443; ma86400 html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Sat, 13 Jul 2024 12:27:20 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveStrict-Transport-Security: max-age31536000Vary: Accept-EncodingX-hacker: Want root? Visit join.a8c.com and mention this header.Host-Header: WordPress.comVary: accept, content-type, cookieX-UA-Compatible: IEedgeLink: https://blog.includesecurity.com/wp-json/>; relhttps://api.w.org/Link: https://wp.me/9RwVC>; relshortlinkLast-Modified: Sat, 13 Jul 2024 12:27:20 GMTCache-Control: max-age300, must-revalidateX-nananana: Batcache-SetX-ac: 2.sea _atomic_bur MISSAlt-Svc: h3:443; ma86400 !DOCTYPE html>html langen-US>head> meta charsetUTF-8> link relprofile hrefhttps://gmpg.org/xfn/11> meta namerobots contentindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1 /> !-- This site is optimized with the Yoast SEO plugin v23.0 - https://yoast.com/wordpress/plugins/seo/ --> title>Include Security Research Blog - Team Research blog/title> meta namedescription contentTeam Research blog /> link relcanonical hrefhttps://blog.includesecurity.com/ /> link relnext hrefhttps://blog.includesecurity.com/page/2/ /> meta propertyog:locale contenten_US /> meta propertyog:type contentwebsite /> meta propertyog:title contentInclude Security Research Blog /> meta propertyog:description contentTeam Research blog /> meta propertyog:url contenthttps://blog.includesecurity.com/ /> meta propertyog:site_name contentInclude Security Research Blog /> meta nametwitter:card contentsummary_large_image /> meta nametwitter:site content@includesecurity /> script typeapplication/ld+json classyoast-schema-graph>{@context:https://schema.org,@graph:{@type:CollectionPage,@id:https://blog.includesecurity.com/,url:https://blog.includesecurity.com/,name:Include Security Research Blog - Team Research blog,isPartOf:{@id:https://blog.includesecurity.com/#website},about:{@id:https://blog.includesecurity.com/#organization},description:Team Research blog,breadcrumb:{@id:https://blog.includesecurity.com/#breadcrumb},inLanguage:en-US},{@type:BreadcrumbList,@id:https://blog.includesecurity.com/#breadcrumb,itemListElement:{@type:ListItem,position:1,name:Home}},{@type:WebSite,@id:https://blog.includesecurity.com/#website,url:https://blog.includesecurity.com/,name:Include Security Research Blog,description:Team Research blog,publisher:{@id:https://blog.includesecurity.com/#organization},potentialAction:{@type:SearchAction,target:{@type:EntryPoint,urlTemplate:https://blog.includesecurity.com/?s{search_term_string}},query-input:required namesearch_term_string},inLanguage:en-US},{@type:Organization,@id:https://blog.includesecurity.com/#organization,name:Include Security,url:https://blog.includesecurity.com/,logo:{@type:ImageObject,inLanguage:en-US,@id:https://blog.includesecurity.com/#/schema/logo/image/,url:https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2021/02/includesec.png?fit151%2C151&ssl1,contentUrl:https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2021/02/includesec.png?fit151%2C151&ssl1,width:151,height:151,caption:Include Security},image:{@id:https://blog.includesecurity.com/#/schema/logo/image/},sameAs:https://x.com/includesecurity,https://www.linkedin.com/company/include-security-llc,https://www.youtube.com/user/IncludeSecurity}}/script> !-- / Yoast SEO plugin. -->link reldns-prefetch href//secure.gravatar.com />link reldns-prefetch href//stats.wp.com />link reldns-prefetch href//widgets.wp.com />link reldns-prefetch href//s0.wp.com />link reldns-prefetch href//0.gravatar.com />link reldns-prefetch href//1.gravatar.com />link reldns-prefetch href//2.gravatar.com />link reldns-prefetch href//jetpack.wordpress.com />link reldns-prefetch href//public-api.wordpress.com />link reldns-prefetch href//i0.wp.com />link reldns-prefetch href//c0.wp.com />link relalternate typeapplication/rss+xml titleInclude Security Research Blog » Feed hrefhttps://blog.includesecurity.com/feed/ />link relalternate typeapplication/rss+xml titleInclude Security Research Blog » Comments Feed hrefhttps://blog.includesecurity.com/comments/feed/ />script>window._wpemojiSettings {baseUrl:https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/,ext:.png,svgUrl:https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/,svgExt:.svg,source:{concatemoji:https:\/\/blog.includesecurity.com\/wp-includes\/js\/wp-emoji-release.min.js?ver6.5.5}};/*! This file is auto-generated */!function(i,n){var o,s,e;function c(e){try{var t{supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var tnew Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return ert})}function u(e,t,n){switch(t){caseflag:return n(e,\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f,\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f)?!1:!n(e,\ud83c\uddfa\ud83c\uddf3,\ud83c\uddfa\u200b\ud83c\uddf3)&&!n(e,\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f,\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f);caseemoji:return!n(e,\ud83d\udc26\u200d\u2b1b,\ud83d\udc26\u200b\u2b1b)}return!1}function f(e,t,n){var rundefined!typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement(canvas),ar.getContext(2d,{willReadFrequently:!0}),o(a.textBaselinetop,a.font600 32px Arial,{});return e.forEach(function(e){oet(a,e,n)}),o}function t(e){var ti.createElement(script);t.srce,t.defer!0,i.head.appendChild(t)}undefined!typeof Promise&&(owpEmojiSettingsSupports,sflag,emoji,n.supports{everything:!0,everythingExceptFlag:!0},enew Promise(function(e){i.addEventListener(DOMContentLoaded,e,{once:!0})}),new Promise(function(t){var nfunction(){try{var eJSON.parse(sessionStorage.getItem(o));if(objecttypeof e&&numbertypeof e.timestamp&&(new Date).valueOf()e.timestamp+604800&&objecttypeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if(undefined!typeof Worker&&undefined!typeof OffscreenCanvas&&undefined!typeof URL&&URL.createObjectURL&&undefined!typeof Blob)try{var epostMessage(+f.toString()+(+JSON.stringify(s),u.toString(),p.toString().join(,)+));,rnew Blob(e,{type:text/javascript}),anew Worker(URL.createObjectURL(r),{name:wpTestEmojiSupports});return void(a.onmessagefunction(e){c(ne.data),a.terminate(),t(n)})}catch(e){}c(nf(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supportstet,n.supports.everythingn.supports.everything&&n.supportst,flag!t&&(n.supports.everythingExceptFlagn.supports.everythingExceptFlag&&n.supportst);n.supports.everythingExceptFlagn.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady!1,n.readyCallbackfunction(){n.DOMReady!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(en.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings);/script>style idwp-emoji-styles-inline-css> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; }/style>link relstylesheet idwp-block-library-css hrefhttps://c0.wp.com/c/6.5.5/wp-includes/css/dist/block-library/style.min.css mediaall />style idwp-block-library-inline-css>.has-text-align-justify{text-align:justify;}/style>link relstylesheet idmediaelement-css hrefhttps://c0.wp.com/c/6.5.5/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css mediaall />link relstylesheet idwp-mediaelement-css hrefhttps://c0.wp.com/c/6.5.5/wp-includes/js/mediaelement/wp-mediaelement.min.css mediaall />style idjetpack-sharing-buttons-style-inline-css>.jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em}/style>style idclassic-theme-styles-inline-css>/*! This file is auto-generated */.wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none}/style>style idglobal-styles-inline-css>body{--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--font-family--albert-sans: Albert Sans, sans-serif;--wp--preset--font-family--alegreya: Alegreya, serif;--wp--preset--font-family--arvo: Arvo, serif;--wp--preset--font-family--bodoni-moda: Bodoni Moda, serif;--wp--preset--font-family--bricolage-grotesque: Bricolage Grotesque, sans-serif;--wp--preset--font-family--cabin: Cabin, sans-serif;--wp--preset--font-family--chivo: Chivo, sans-serif;--wp--preset--font-family--commissioner: Commissioner, sans-serif;--wp--preset--font-family--cormorant: Cormorant, serif;--wp--preset--font-family--courier-prime: Courier Prime, monospace;--wp--preset--font-family--crimson-pro: Crimson Pro, serif;--wp--preset--font-family--dm-mono: DM Mono, monospace;--wp--preset--font-family--dm-sans: DM Sans, sans-serif;--wp--preset--font-family--dm-serif-display: DM Serif Display, serif;--wp--preset--font-family--domine: Domine, serif;--wp--preset--font-family--eb-garamond: EB Garamond, serif;--wp--preset--font-family--epilogue: Epilogue, sans-serif;--wp--preset--font-family--fahkwang: Fahkwang, sans-serif;--wp--preset--font-family--figtree: Figtree, sans-serif;--wp--preset--font-family--fira-sans: Fira Sans, sans-serif;--wp--preset--font-family--fjalla-one: Fjalla One, sans-serif;--wp--preset--font-family--fraunces: Fraunces, serif;--wp--preset--font-family--gabarito: Gabarito, system-ui;--wp--preset--font-family--ibm-plex-mono: IBM Plex Mono, monospace;--wp--preset--font-family--ibm-plex-sans: IBM Plex Sans, sans-serif;--wp--preset--font-family--ibarra-real-nova: Ibarra Real Nova, serif;--wp--preset--font-family--instrument-serif: Instrument Serif, serif;--wp--preset--font-family--inter: Inter, sans-serif;--wp--preset--font-family--josefin-sans: Josefin Sans, sans-serif;--wp--preset--font-family--jost: Jost, sans-serif;--wp--preset--font-family--libre-baskerville: Libre Baskerville, serif;--wp--preset--font-family--libre-franklin: Libre Franklin, sans-serif;--wp--preset--font-family--literata: Literata, serif;--wp--preset--font-family--lora: Lora, serif;--wp--preset--font-family--merriweather: Merriweather, serif;--wp--preset--font-family--montserrat: Montserrat, sans-serif;--wp--preset--font-family--newsreader: Newsreader, serif;--wp--preset--font-family--noto-sans-mono: Noto Sans Mono, sans-serif;--wp--preset--font-family--nunito: Nunito, sans-serif;--wp--preset--font-family--open-sans: Open Sans, sans-serif;--wp--preset--font-family--overpass: Overpass, sans-serif;--wp--preset--font-family--pt-serif: PT Serif, serif;--wp--preset--font-family--petrona: Petrona, serif;--wp--preset--font-family--piazzolla: Piazzolla, serif;--wp--preset--font-family--playfair-display: Playfair Display, serif;--wp--preset--font-family--plus-jakarta-sans: Plus Jakarta Sans, sans-serif;--wp--preset--font-family--poppins: Poppins, sans-serif;--wp--preset--font-family--raleway: Raleway, sans-serif;--wp--preset--font-family--roboto: Roboto, sans-serif;--wp--preset--font-family--roboto-slab: Roboto Slab, serif;--wp--preset--font-family--rubik: Rubik, sans-serif;--wp--preset--font-family--rufina: Rufina, serif;--wp--preset--font-family--sora: Sora, sans-serif;--wp--preset--font-family--source-sans-3: Source Sans 3, sans-serif;--wp--preset--font-family--source-serif-4: Source Serif 4, serif;--wp--preset--font-family--space-mono: Space Mono, monospace;--wp--preset--font-family--syne: Syne, sans-serif;--wp--preset--font-family--texturina: Texturina, serif;--wp--preset--font-family--urbanist: Urbanist, sans-serif;--wp--preset--font-family--work-sans: Work Sans, sans-serif;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}body .is-layout-flex{flex-wrap: wrap;align-items: center;}body .is-layout-flex > *{margin: 0;}body .is-layout-grid{display: grid;}body .is-layout-grid > *{margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;}.has-albert-sans-font-family{font-family: var(--wp--preset--font-family--albert-sans) !important;}.has-alegreya-font-family{font-family: var(--wp--preset--font-family--alegreya) !important;}.has-arvo-font-family{font-family: var(--wp--preset--font-family--arvo) !important;}.has-bodoni-moda-font-family{font-family: var(--wp--preset--font-family--bodoni-moda) !important;}.has-bricolage-grotesque-font-family{font-family: var(--wp--preset--font-family--bricolage-grotesque) !important;}.has-cabin-font-family{font-family: var(--wp--preset--font-family--cabin) !important;}.has-chivo-font-family{font-family: var(--wp--preset--font-family--chivo) !important;}.has-commissioner-font-family{font-family: var(--wp--preset--font-family--commissioner) !important;}.has-cormorant-font-family{font-family: var(--wp--preset--font-family--cormorant) !important;}.has-courier-prime-font-family{font-family: var(--wp--preset--font-family--courier-prime) !important;}.has-crimson-pro-font-family{font-family: var(--wp--preset--font-family--crimson-pro) !important;}.has-dm-mono-font-family{font-family: var(--wp--preset--font-family--dm-mono) !important;}.has-dm-sans-font-family{font-family: var(--wp--preset--font-family--dm-sans) !important;}.has-dm-serif-display-font-family{font-family: var(--wp--preset--font-family--dm-serif-display) !important;}.has-domine-font-family{font-family: var(--wp--preset--font-family--domine) !important;}.has-eb-garamond-font-family{font-family: var(--wp--preset--font-family--eb-garamond) !important;}.has-epilogue-font-family{font-family: var(--wp--preset--font-family--epilogue) !important;}.has-fahkwang-font-family{font-family: var(--wp--preset--font-family--fahkwang) !important;}.has-figtree-font-family{font-family: var(--wp--preset--font-family--figtree) !important;}.has-fira-sans-font-family{font-family: var(--wp--preset--font-family--fira-sans) !important;}.has-fjalla-one-font-family{font-family: var(--wp--preset--font-family--fjalla-one) !important;}.has-fraunces-font-family{font-family: var(--wp--preset--font-family--fraunces) !important;}.has-gabarito-font-family{font-family: var(--wp--preset--font-family--gabarito) !important;}.has-ibm-plex-mono-font-family{font-family: var(--wp--preset--font-family--ibm-plex-mono) !important;}.has-ibm-plex-sans-font-family{font-family: var(--wp--preset--font-family--ibm-plex-sans) !important;}.has-ibarra-real-nova-font-family{font-family: var(--wp--preset--font-family--ibarra-real-nova) !important;}.has-instrument-serif-font-family{font-family: var(--wp--preset--font-family--instrument-serif) !important;}.has-inter-font-family{font-family: var(--wp--preset--font-family--inter) !important;}.has-josefin-sans-font-family{font-family: var(--wp--preset--font-family--josefin-sans) !important;}.has-jost-font-family{font-family: var(--wp--preset--font-family--jost) !important;}.has-libre-baskerville-font-family{font-family: var(--wp--preset--font-family--libre-baskerville) !important;}.has-libre-franklin-font-family{font-family: var(--wp--preset--font-family--libre-franklin) !important;}.has-literata-font-family{font-family: var(--wp--preset--font-family--literata) !important;}.has-lora-font-family{font-family: var(--wp--preset--font-family--lora) !important;}.has-merriweather-font-family{font-family: var(--wp--preset--font-family--merriweather) !important;}.has-montserrat-font-family{font-family: var(--wp--preset--font-family--montserrat) !important;}.has-newsreader-font-family{font-family: var(--wp--preset--font-family--newsreader) !important;}.has-noto-sans-mono-font-family{font-family: var(--wp--preset--font-family--noto-sans-mono) !important;}.has-nunito-font-family{font-family: var(--wp--preset--font-family--nunito) !important;}.has-open-sans-font-family{font-family: var(--wp--preset--font-family--open-sans) !important;}.has-overpass-font-family{font-family: var(--wp--preset--font-family--overpass) !important;}.has-pt-serif-font-family{font-family: var(--wp--preset--font-family--pt-serif) !important;}.has-petrona-font-family{font-family: var(--wp--preset--font-family--petrona) !important;}.has-piazzolla-font-family{font-family: var(--wp--preset--font-family--piazzolla) !important;}.has-playfair-display-font-family{font-family: var(--wp--preset--font-family--playfair-display) !important;}.has-plus-jakarta-sans-font-family{font-family: var(--wp--preset--font-family--plus-jakarta-sans) !important;}.has-poppins-font-family{font-family: var(--wp--preset--font-family--poppins) !important;}.has-raleway-font-family{font-family: var(--wp--preset--font-family--raleway) !important;}.has-roboto-font-family{font-family: var(--wp--preset--font-family--roboto) !important;}.has-roboto-slab-font-family{font-family: var(--wp--preset--font-family--roboto-slab) !important;}.has-rubik-font-family{font-family: var(--wp--preset--font-family--rubik) !important;}.has-rufina-font-family{font-family: var(--wp--preset--font-family--rufina) !important;}.has-sora-font-family{font-family: var(--wp--preset--font-family--sora) !important;}.has-source-sans-3-font-family{font-family: var(--wp--preset--font-family--source-sans-3) !important;}.has-source-serif-4-font-family{font-family: var(--wp--preset--font-family--source-serif-4) !important;}.has-space-mono-font-family{font-family: var(--wp--preset--font-family--space-mono) !important;}.has-syne-font-family{font-family: var(--wp--preset--font-family--syne) !important;}.has-texturina-font-family{font-family: var(--wp--preset--font-family--texturina) !important;}.has-urbanist-font-family{font-family: var(--wp--preset--font-family--urbanist) !important;}.has-work-sans-font-family{font-family: var(--wp--preset--font-family--work-sans) !important;}.wp-block-navigation a:where(:not(.wp-element-button)){color: inherit;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}.wp-block-pullquote{font-size: 1.5em;line-height: 1.6;}/style>link relstylesheet idgenerate-style-css hrefhttps://blog.includesecurity.com/wp-content/themes/generatepress/assets/css/main.min.css?ver3.0.2 mediaall />style idgenerate-style-inline-css>body{background-color:#ffffff;color:#222222;}a{color:#1e73be;}a:hover, a:focus, a:active{color:#000000;}.wp-block-group__inner-container{max-width:1200px;margin-left:auto;margin-right:auto;}.site-header .header-image{width:270px;}body, button, input, select, textarea{font-family:-apple-system, system-ui, BlinkMacSystemFont, Segoe UI, Helvetica, Arial, sans-serif, Apple Color Emoji, Segoe UI Emoji, Segoe UI Symbol;}body{line-height:1.5;}.entry-content > class*wp-block-:not(:last-child){margin-bottom:1.5em;}.main-navigation .main-nav ul ul li a{font-size:14px;}.sidebar .widget, .footer-widgets .widget{font-size:17px;}h1{line-height:1em;}h2{line-height:1em;}h3{line-height:1em;}@media (max-width:768px){h1{font-size:31px;}h2{font-size:27px;}h3{font-size:24px;}h4{font-size:22px;}h5{font-size:19px;}}.top-bar{background-color:#636363;color:#ffffff;}.top-bar a{color:#ffffff;}.top-bar a:hover{color:#303030;}.site-header{background-color:#ffffff;}.main-title a,.main-title a:hover{color:#222222;}.site-description{color:#757575;}.mobile-menu-control-wrapper .menu-toggle,.mobile-menu-control-wrapper .menu-toggle:hover,.mobile-menu-control-wrapper .menu-toggle:focus,.has-inline-mobile-toggle #site-navigation.toggled{background-color:rgba(0, 0, 0, 0.02);}.main-navigation,.main-navigation ul ul{background-color:#ffffff;}.main-navigation .main-nav ul li a,.menu-toggle, .main-navigation .menu-bar-items{color:#515151;}.main-navigation .main-nav ul li:hover > a,.main-navigation .main-nav ul li:focus > a, .main-navigation .main-nav ul li.sfHover > a, .main-navigation .menu-bar-item:hover > a, .main-navigation .menu-bar-item.sfHover > a{color:#7a8896;background-color:#ffffff;}button.menu-toggle:hover,button.menu-toggle:focus{color:#515151;}.main-navigation .main-nav ul liclass*current-menu- > a{color:#7a8896;background-color:#ffffff;}.main-navigation .main-nav ul liclass*current-menu- > a:hover,.main-navigation .main-nav ul liclass*current-menu-.sfHover > a{color:#7a8896;background-color:#ffffff;}.navigation-search inputtypesearch,.navigation-search inputtypesearch:active, .navigation-search inputtypesearch:focus, .main-navigation .main-nav ul li.search-item.active > a, .main-navigation .menu-bar-items .search-item.active > a{color:#7a8896;background-color:#ffffff;}.main-navigation ul ul{background-color:#eaeaea;}.main-navigation .main-nav ul ul li a{color:#515151;}.main-navigation .main-nav ul ul li:hover > a,.main-navigation .main-nav ul ul li:focus > a,.main-navigation .main-nav ul ul li.sfHover > a{color:#7a8896;background-color:#eaeaea;}.main-navigation .main-nav ul ul liclass*current-menu- > a{color:#7a8896;background-color:#eaeaea;}.main-navigation .main-nav ul ul liclass*current-menu- > a:hover,.main-navigation .main-nav ul ul liclass*current-menu-.sfHover > a{color:#7a8896;background-color:#eaeaea;}.separate-containers .inside-article, .separate-containers .comments-area, .separate-containers .page-header, .one-container .container, .separate-containers .paging-navigation, .inside-page-header{background-color:#ffffff;}.entry-title a{color:#1b1f35;}.entry-title a:hover{color:#55555e;}.entry-meta{color:#595959;}.sidebar .widget{background-color:#ffffff;}.footer-widgets{background-color:#ffffff;}.footer-widgets .widget-title{color:#000000;}.site-info{color:#ffffff;background-color:#55555e;}.site-info a{color:#ffffff;}.site-info a:hover{color:#d3d3d3;}.footer-bar .widget_nav_menu .current-menu-item a{color:#d3d3d3;}inputtypetext,inputtypeemail,inputtypeurl,inputtypepassword,inputtypesearch,inputtypetel,inputtypenumber,textarea,select{color:#666666;background-color:#fafafa;border-color:#cccccc;}inputtypetext:focus,inputtypeemail:focus,inputtypeurl:focus,inputtypepassword:focus,inputtypesearch:focus,inputtypetel:focus,inputtypenumber:focus,textarea:focus,select:focus{color:#666666;background-color:#ffffff;border-color:#bfbfbf;}button,html inputtypebutton,inputtypereset,inputtypesubmit,a.button,a.wp-block-button__link:not(.has-background){color:#ffffff;background-color:#55555e;}button:hover,html inputtypebutton:hover,inputtypereset:hover,inputtypesubmit:hover,a.button:hover,button:focus,html inputtypebutton:focus,inputtypereset:focus,inputtypesubmit:focus,a.button:focus,a.wp-block-button__link:not(.has-background):active,a.wp-block-button__link:not(.has-background):focus,a.wp-block-button__link:not(.has-background):hover{color:#ffffff;background-color:#3f4047;}a.generate-back-to-top{background-color:rgba( 0,0,0,0.4 );color:#ffffff;}a.generate-back-to-top:hover,a.generate-back-to-top:focus{background-color:rgba( 0,0,0,0.6 );color:#ffffff;}@media (max-width:768px){.main-navigation .menu-bar-item:hover > a, .main-navigation .menu-bar-item.sfHover > a{background:none;color:#515151;}}.nav-below-header .main-navigation .inside-navigation.grid-container, .nav-above-header .main-navigation .inside-navigation.grid-container{padding:0px 20px 0px 20px;}.separate-containers .paging-navigation{padding-top:20px;padding-bottom:20px;}.entry-content .alignwide, body:not(.no-sidebar) .entry-content .alignfull{margin-left:-40px;width:calc(100% + 80px);max-width:calc(100% + 80px);}.rtl .menu-item-has-children .dropdown-menu-toggle{padding-left:20px;}.rtl .main-navigation .main-nav ul li.menu-item-has-children > a{padding-right:20px;}@media (max-width:768px){.separate-containers .inside-article, .separate-containers .comments-area, .separate-containers .page-header, .separate-containers .paging-navigation, .one-container .site-content, .inside-page-header, .wp-block-group__inner-container{padding:30px;}.inside-top-bar{padding-right:30px;padding-left:30px;}.inside-header{padding-right:30px;padding-left:30px;}.widget-area .widget{padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px;}.footer-widgets-container{padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px;}.inside-site-info{padding-right:30px;padding-left:30px;}.entry-content .alignwide, body:not(.no-sidebar) .entry-content .alignfull{margin-left:-30px;width:calc(100% + 60px);max-width:calc(100% + 60px);}.one-container .site-main .paging-navigation{margin-bottom:20px;}}/* End cached CSS */.is-right-sidebar{width:30%;}.is-left-sidebar{width:30%;}.site-content .content-area{width:100%;}@media (max-width:768px){.main-navigation .menu-toggle,.sidebar-nav-mobile:not(#sticky-placeholder){display:block;}.main-navigation ul,.gen-sidebar-nav,.main-navigation:not(.slideout-navigation):not(.toggled) .main-nav > ul,.has-inline-mobile-toggle #site-navigation .inside-navigation > *:not(.navigation-search):not(.main-nav){display:none;}.nav-align-right .inside-navigation,.nav-align-center .inside-navigation{justify-content:space-between;}}/style>link relstylesheet idenlighterjs-css hrefhttps://blog.includesecurity.com/wp-content/plugins/enlighter/cache/enlighterjs.min.css?vervcFzeYSNeR1CecZ mediaall />link relstylesheet idjetpack_css-css hrefhttps://blog.includesecurity.com/wp-content/plugins/jetpack/css/jetpack.css?ver13.7-a.1 mediaall />script srchttps://blog.includesecurity.com/wp-content/plugins/stop-user-enumeration/frontend/js/frontend.js?ver1.6 idstop-user-enumeration-js>/script>script srchttps://blog.includesecurity.com/wp-content/plugins/jetpack/_inc/build/tiled-gallery/tiled-gallery/tiled-gallery.min.js?ver13.7-a.1 idtiled-gallery-js>/script>link relhttps://api.w.org/ hrefhttps://blog.includesecurity.com/wp-json/ />link relEditURI typeapplication/rsd+xml titleRSD hrefhttps://blog.includesecurity.com/xmlrpc.php?rsd />link relshortlink hrefhttps://wp.me/9RwVC /> style>img#wpstats{display:none}/style> meta nameviewport contentwidthdevice-width, initial-scale1>!-- There is no amphtml version available for this URL. -->link relicon hrefhttps://blog.includesecurity.com/wp-content/uploads/2021/02/favicon.ico sizes32x32 />link relicon hrefhttps://blog.includesecurity.com/wp-content/uploads/2021/02/favicon.ico sizes192x192 />link relapple-touch-icon hrefhttps://blog.includesecurity.com/wp-content/uploads/2021/02/favicon.ico />meta namemsapplication-TileImage contenthttps://blog.includesecurity.com/wp-content/uploads/2021/02/favicon.ico />style typetext/css idwp-custom-css>#page,#content,#primary,#main { max-width: 960px;}.site-header { background: #1b1f35; color: #fff; margin-bottom: 0px;}.site-description { color: #9ed54d; font-variant: small-caps; text-transform: lowercase; font-size:2em; height:100%; vertical-align:bottom; line-height: 0.7em;}.main-title { color: #fff;}.main-navigation { padding: 0px; margin: 0px; line-height: 10px;}.main-navigation .main-nav ul li a, .main-navigation .menu-toggle { color: #1b1f35; font-weight: bold;}.entry-content > class*wp-block-:not(:last-child) { margin-top: 1em; margin-bottom: 0.5em;}/style>/head>body classhome blog wp-custom-logo wp-embed-responsive no-sidebar nav-below-header separate-containers header-aligned-center dropdown-hover itemtypehttps://schema.org/Blog itemscope> a classscreen-reader-text skip-link href#content titleSkip to content>Skip to content/a> header idmasthead classsite-header itemtypehttps://schema.org/WPHeader itemscope> div classinside-header grid-container> div classsite-branding-container>div classsite-logo> a hrefhttps://blog.includesecurity.com/ titleInclude Security Research Blog relhome> img classheader-image is-logo-image altInclude Security Research Blog srchttps://blog.includesecurity.com/wp-content/uploads/2018/05/logo.svg titleInclude Security Research Blog /> /a> /div>div classsite-branding> p classsite-description itempropdescription> Team Research blog /p> /div>/div> /div> /header> nav idsite-navigation classmain-navigation nav-align-center sub-menu-right itemtypehttps://schema.org/SiteNavigationElement itemscope> div classinside-navigation grid-container> button classmenu-toggle aria-controlsprimary-menu aria-expandedfalse> span classgp-icon icon-menu-bars>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM0 96c0-13.255 10.745-24 24-24h464c13.255 0 24 10.745 24 24s-10.745 24-24 24H24c-13.255 0-24-10.745-24-24zm0 160c0-13.255 10.745-24 24-24h464c13.255 0 24 10.745 24 24s-10.745 24-24 24H24c-13.255 0-24-10.745-24-24zm0 160c0-13.255 10.745-24 24-24h464c13.255 0 24 10.745 24 24s-10.745 24-24 24H24c-13.255 0-24-10.745-24-24z /> /svg>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM71.029 71.029c9.373-9.372 24.569-9.372 33.942 0L256 222.059l151.029-151.03c9.373-9.372 24.569-9.372 33.942 0 9.372 9.373 9.372 24.569 0 33.942L289.941 256l151.03 151.029c9.372 9.373 9.372 24.569 0 33.942-9.373 9.372-24.569 9.372-33.942 0L256 289.941l-151.029 151.03c-9.373 9.372-24.569 9.372-33.942 0-9.372-9.373-9.372-24.569 0-33.942L222.059 256 71.029 104.971c-9.372-9.373-9.372-24.569 0-33.942z /> /svg>/span>span classmobile-menu>Menu/span> /button> div idprimary-menu classmain-nav>ul idmenu-primary class menu sf-menu>li idmenu-item-57 classmenu-item menu-item-type-custom menu-item-object-custom menu-item-57>a hrefhttps://includesecurity.com/#home>Home/a>/li>li idmenu-item-61 classmenu-item menu-item-type-custom menu-item-object-custom menu-item-61>a hrefhttps://includesecurity.com/#careers>Careers/a>/li>li idmenu-item-62 classmenu-item menu-item-type-custom menu-item-object-custom menu-item-62>a hrefhttps://includesecurity.com/#contact>Contact Us/a>/li>li idmenu-item-428 classtwitterIcon menu-item menu-item-type-custom menu-item-object-custom menu-item-428>a hrefhttps://twitter.com/includesecurity>Twitter/a>/li>/ul>/div> /div> /nav> div idpage classsite grid-container container hfeed> div idcontent classsite-content> div idprimary classcontent-area> main idmain classsite-main> article idpost-2189 classpost-2189 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized tag-appsec tag-fuzzing tag-hacking tag-owasp tag-security-research tag-vulnerability tag-webappsec itemtypehttps://schema.org/CreativeWork itemscope> div classinside-article> header classentry-header> h2 classentry-title itempropheadline>a hrefhttps://blog.includesecurity.com/2024/04/coverage-guided-fuzzing-extending-instrumentation/ relbookmark>Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster!/a>/h2> div classentry-meta> span classposted-on>time classupdated datetime2024-04-25T15:33:19-04:00 itempropdateModified>April 25, 2024/time>time classentry-date published datetime2024-04-25T14:30:28-04:00 itempropdatePublished>April 25, 2024/time>/span> span classbyline> — span classauthor vcard itempropauthor itemtypehttps://schema.org/Person itemscope>span classauthor-name itempropname>Bruno Oliveira/span>/span>/span> /div> /header> div classpost-image> a hrefhttps://blog.includesecurity.com/2024/04/coverage-guided-fuzzing-extending-instrumentation/> img width479 height483 srchttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/04/fuzzybear3.png?fit479%2C483&ssl1 classattachment-full size-full wp-post-image alt itempropimage decodingasync fetchpriorityhigh srcsethttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/04/fuzzybear3.png?w479&ssl1 479w, https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/04/fuzzybear3.png?resize298%2C300&ssl1 298w, https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/04/fuzzybear3.png?resize150%2C150&ssl1 150w sizes(max-width: 479px) 100vw, 479px data-attachment-id2259 data-permalinkhttps://blog.includesecurity.com/2024/04/coverage-guided-fuzzing-extending-instrumentation/fuzzybear3/#main data-orig-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/04/fuzzybear3.png?fit479%2C483&ssl1 data-orig-size479,483 data-comments-opened1 data-image-meta{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0"} data-image-titlefuzzybear3 data-image-description data-image-caption data-medium-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/04/fuzzybear3.png?fit298%2C300&ssl1 data-large-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/04/fuzzybear3.png?fit479%2C483&ssl1 tabindex0 rolebutton /> /a> /div> div classentry-summary itemproptext> p>In our latest blog post, we introduce coverage-guided fuzzing with a brief description of fundamentals and a demonstration of how modifying program instrumentation can be used to more easily track down the source of vulnerabilities and identify interesting fuzzing paths./p> /div> footer classentry-meta> span classcat-links>span classgp-icon icon-categories>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM0 112c0-26.51 21.49-48 48-48h110.014a48 48 0 0 1 43.592 27.907l12.349 26.791A16 16 0 0 0 228.486 128H464c26.51 0 48 21.49 48 48v224c0 26.51-21.49 48-48 48H48c-26.51 0-48-21.49-48-48V112z fill-rulenonzero/> /svg>/span>span classscreen-reader-text>Categories /span>a hrefhttps://blog.includesecurity.com/category/uncategorized/ relcategory tag>Uncategorized/a>/span> span classtags-links>span classgp-icon icon-tags>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM20 39.5c-8.836 0-16 7.163-16 16v176c0 4.243 1.686 8.313 4.687 11.314l224 224c6.248 6.248 16.378 6.248 22.626 0l176-176c6.244-6.244 6.25-16.364.013-22.615l-223.5-224A15.999 15.999 0 0 0 196.5 39.5H20zm56 96c0-13.255 10.745-24 24-24s24 10.745 24 24-10.745 24-24 24-24-10.745-24-24z/> path dM259.515 43.015c4.686-4.687 12.284-4.687 16.97 0l228 228c4.686 4.686 4.686 12.284 0 16.97l-180 180c-4.686 4.687-12.284 4.687-16.97 0-4.686-4.686-4.686-12.284 0-16.97L479.029 279.5 259.515 59.985c-4.686-4.686-4.686-12.284 0-16.97z fill-rulenonzero/> /svg>/span>span classscreen-reader-text>Tags /span>a hrefhttps://blog.includesecurity.com/tag/appsec/ reltag>appsec/a>, a hrefhttps://blog.includesecurity.com/tag/fuzzing/ reltag>fuzzing/a>, a hrefhttps://blog.includesecurity.com/tag/hacking/ reltag>hacking/a>, a hrefhttps://blog.includesecurity.com/tag/owasp/ reltag>OWASP/a>, a hrefhttps://blog.includesecurity.com/tag/security-research/ reltag>security research/a>, a hrefhttps://blog.includesecurity.com/tag/vulnerability/ reltag>vulnerability/a>, a hrefhttps://blog.includesecurity.com/tag/webappsec/ reltag>webappsec/a>/span> /footer> /div>/article>article idpost-2073 classpost-2073 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized tag-appsec tag-deserialization tag-gadget-chains tag-hacking tag-offensive-security tag-owasp tag-remote-code-execution tag-ruby tag-ruby-hacking tag-security-research tag-webappsec itemtypehttps://schema.org/CreativeWork itemscope> div classinside-article> header classentry-header> h2 classentry-title itempropheadline>a hrefhttps://blog.includesecurity.com/2024/03/discovering-deserialization-gadget-chains-in-rubyland/ relbookmark>Discovering Deserialization Gadget Chains in Rubyland/a>/h2> div classentry-meta> span classposted-on>time classupdated datetime2024-03-13T18:15:04-04:00 itempropdateModified>March 13, 2024/time>time classentry-date published datetime2024-03-13T14:32:24-04:00 itempropdatePublished>March 13, 2024/time>/span> span classbyline> — span classauthor vcard itempropauthor itemtypehttps://schema.org/Person itemscope>span classauthor-name itempropname>Alex Leahu/span>/span>/span> /div> /header> div classpost-image> a hrefhttps://blog.includesecurity.com/2024/03/discovering-deserialization-gadget-chains-in-rubyland/> img width512 height512 srchttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/03/rubyland-2-edited.png?fit512%2C512&ssl1 classattachment-full size-full wp-post-image alt itempropimage decodingasync srcsethttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/03/rubyland-2-edited.png?w512&ssl1 512w, https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/03/rubyland-2-edited.png?resize300%2C300&ssl1 300w, https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/03/rubyland-2-edited.png?resize150%2C150&ssl1 150w sizes(max-width: 512px) 100vw, 512px data-attachment-id2163 data-permalinkhttps://blog.includesecurity.com/2024/03/discovering-deserialization-gadget-chains-in-rubyland/rubyland-2-edited/#main data-orig-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/03/rubyland-2-edited.png?fit512%2C512&ssl1 data-orig-size512,512 data-comments-opened1 data-image-meta{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0"} data-image-titlerubyland-2-edited data-image-description data-image-caption data-medium-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/03/rubyland-2-edited.png?fit300%2C300&ssl1 data-large-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/03/rubyland-2-edited.png?fit512%2C512&ssl1 tabindex0 rolebutton /> /a> /div> div classentry-summary itemproptext> p>Finding deserialization functions accepting user input can be exciting, but what’s your plan if well-known gadget chains aren’t an option for exploitation? In this post, we explore the process of building a custom gadget chain to exploit deserialization vulnerabilities in Ruby./p> /div> footer classentry-meta> span classcat-links>span classgp-icon icon-categories>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM0 112c0-26.51 21.49-48 48-48h110.014a48 48 0 0 1 43.592 27.907l12.349 26.791A16 16 0 0 0 228.486 128H464c26.51 0 48 21.49 48 48v224c0 26.51-21.49 48-48 48H48c-26.51 0-48-21.49-48-48V112z fill-rulenonzero/> /svg>/span>span classscreen-reader-text>Categories /span>a hrefhttps://blog.includesecurity.com/category/uncategorized/ relcategory tag>Uncategorized/a>/span> span classtags-links>span classgp-icon icon-tags>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM20 39.5c-8.836 0-16 7.163-16 16v176c0 4.243 1.686 8.313 4.687 11.314l224 224c6.248 6.248 16.378 6.248 22.626 0l176-176c6.244-6.244 6.25-16.364.013-22.615l-223.5-224A15.999 15.999 0 0 0 196.5 39.5H20zm56 96c0-13.255 10.745-24 24-24s24 10.745 24 24-10.745 24-24 24-24-10.745-24-24z/> path dM259.515 43.015c4.686-4.687 12.284-4.687 16.97 0l228 228c4.686 4.686 4.686 12.284 0 16.97l-180 180c-4.686 4.687-12.284 4.687-16.97 0-4.686-4.686-4.686-12.284 0-16.97L479.029 279.5 259.515 59.985c-4.686-4.686-4.686-12.284 0-16.97z fill-rulenonzero/> /svg>/span>span classscreen-reader-text>Tags /span>a hrefhttps://blog.includesecurity.com/tag/appsec/ reltag>appsec/a>, a hrefhttps://blog.includesecurity.com/tag/deserialization/ reltag>deserialization/a>, a hrefhttps://blog.includesecurity.com/tag/gadget-chains/ reltag>gadget chains/a>, a hrefhttps://blog.includesecurity.com/tag/hacking/ reltag>hacking/a>, a hrefhttps://blog.includesecurity.com/tag/offensive-security/ reltag>offensive security/a>, a hrefhttps://blog.includesecurity.com/tag/owasp/ reltag>OWASP/a>, a hrefhttps://blog.includesecurity.com/tag/remote-code-execution/ reltag>remote code execution/a>, a hrefhttps://blog.includesecurity.com/tag/ruby/ reltag>ruby/a>, a hrefhttps://blog.includesecurity.com/tag/ruby-hacking/ reltag>ruby hacking/a>, a hrefhttps://blog.includesecurity.com/tag/security-research/ reltag>security research/a>, a hrefhttps://blog.includesecurity.com/tag/webappsec/ reltag>webappsec/a>/span> span classcomments-link>span classgp-icon icon-comments>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM132.838 329.973a435.298 435.298 0 0 0 16.769-9.004c13.363-7.574 26.587-16.142 37.419-25.507 7.544.597 15.27.925 23.098.925 54.905 0 105.634-15.311 143.285-41.28 23.728-16.365 43.115-37.692 54.155-62.645 54.739 22.205 91.498 63.272 91.498 110.286 0 42.186-29.558 79.498-75.09 102.828 23.46 49.216 75.09 101.709 75.09 101.709s-115.837-38.35-154.424-78.46c-9.956 1.12-20.297 1.758-30.793 1.758-88.727 0-162.927-43.071-181.007-100.61z fill-rulenonzero/> path dM383.371 132.502c0 70.603-82.961 127.787-185.216 127.787-10.496 0-20.837-.639-30.793-1.757-38.587 40.093-154.424 78.429-154.424 78.429s51.63-52.472 75.09-101.67c-45.532-23.321-75.09-60.619-75.09-102.79C12.938 61.9 95.9 4.716 198.155 4.716 300.41 4.715 383.37 61.9 383.37 132.502z fill-rulenonzero /> /svg>/span>a hrefhttps://blog.includesecurity.com/2024/03/discovering-deserialization-gadget-chains-in-rubyland/#comments>1 Comment/a>/span> /footer> /div>/article>article idpost-1991 classpost-1991 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized tag-ai-hacking tag-ai-injection-2 tag-ai-pentesting tag-ai-prompt-security tag-aisec tag-appsec tag-artificial-learning-security tag-llm-security-2 tag-machine-learning-security tag-mitigating-2 tag-ml-hacking tag-ml-pentesting tag-mlsec tag-owasp tag-owasp-llm tag-prompt-injection itemtypehttps://schema.org/CreativeWork itemscope> div classinside-article> header classentry-header> h2 classentry-title itempropheadline>a hrefhttps://blog.includesecurity.com/2024/02/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers-part-2/ relbookmark>Improving LLM Security Against Prompt Injection: AppSec Guidance For Pentesters and Developers – Part 2/a>/h2> div classentry-meta> span classposted-on>time classupdated datetime2024-02-08T20:07:56-05:00 itempropdateModified>February 8, 2024/time>time classentry-date published datetime2024-02-08T14:42:03-05:00 itempropdatePublished>February 8, 2024/time>/span> span classbyline> — span classauthor vcard itempropauthor itemtypehttps://schema.org/Person itemscope>span classauthor-name itempropname>Abraham Kang/span>/span>/span> /div> /header> div classpost-image> a hrefhttps://blog.includesecurity.com/2024/02/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers-part-2/> img width512 height512 srchttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/02/AI-Attention.png?fit512%2C512&ssl1 classattachment-full size-full wp-post-image alt itempropimage decodingasync srcsethttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/02/AI-Attention.png?w512&ssl1 512w, https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/02/AI-Attention.png?resize300%2C300&ssl1 300w, https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/02/AI-Attention.png?resize150%2C150&ssl1 150w sizes(max-width: 512px) 100vw, 512px data-attachment-id2030 data-permalinkhttps://blog.includesecurity.com/2024/02/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers-part-2/ai-attention/#main data-orig-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/02/AI-Attention.png?fit512%2C512&ssl1 data-orig-size512,512 data-comments-opened1 data-image-meta{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0"} data-image-titleAI Attention data-image-description data-image-caption data-medium-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/02/AI-Attention.png?fit300%2C300&ssl1 data-large-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/02/AI-Attention.png?fit512%2C512&ssl1 tabindex0 rolebutton /> /a> /div> div classentry-summary itemproptext> p>In Part 2 of our series focusing on improving LLM security against prompt injection we’re doing a deeper dive into transformers, attention, and how these topics play a role in prompt injection attacks. This post aims to provide more under-the-hood context about why prompt injection attacks are effective, and why they’re so difficult to mitigate./p> /div> footer classentry-meta> span classcat-links>span classgp-icon icon-categories>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM0 112c0-26.51 21.49-48 48-48h110.014a48 48 0 0 1 43.592 27.907l12.349 26.791A16 16 0 0 0 228.486 128H464c26.51 0 48 21.49 48 48v224c0 26.51-21.49 48-48 48H48c-26.51 0-48-21.49-48-48V112z fill-rulenonzero/> /svg>/span>span classscreen-reader-text>Categories /span>a hrefhttps://blog.includesecurity.com/category/uncategorized/ relcategory tag>Uncategorized/a>/span> span classtags-links>span classgp-icon icon-tags>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM20 39.5c-8.836 0-16 7.163-16 16v176c0 4.243 1.686 8.313 4.687 11.314l224 224c6.248 6.248 16.378 6.248 22.626 0l176-176c6.244-6.244 6.25-16.364.013-22.615l-223.5-224A15.999 15.999 0 0 0 196.5 39.5H20zm56 96c0-13.255 10.745-24 24-24s24 10.745 24 24-10.745 24-24 24-24-10.745-24-24z/> path dM259.515 43.015c4.686-4.687 12.284-4.687 16.97 0l228 228c4.686 4.686 4.686 12.284 0 16.97l-180 180c-4.686 4.687-12.284 4.687-16.97 0-4.686-4.686-4.686-12.284 0-16.97L479.029 279.5 259.515 59.985c-4.686-4.686-4.686-12.284 0-16.97z fill-rulenonzero/> /svg>/span>span classscreen-reader-text>Tags /span>a hrefhttps://blog.includesecurity.com/tag/ai-hacking/ reltag>AI Hacking/a>, a hrefhttps://blog.includesecurity.com/tag/ai-injection-2/ reltag>AI Injection/a>, a hrefhttps://blog.includesecurity.com/tag/ai-pentesting/ reltag>AI Pentesting/a>, a hrefhttps://blog.includesecurity.com/tag/ai-prompt-security/ reltag>AI Prompt Security/a>, a hrefhttps://blog.includesecurity.com/tag/aisec/ reltag>AISec/a>, a hrefhttps://blog.includesecurity.com/tag/appsec/ reltag>appsec/a>, a hrefhttps://blog.includesecurity.com/tag/artificial-learning-security/ reltag>Artificial Learning Security/a>, a hrefhttps://blog.includesecurity.com/tag/llm-security-2/ reltag>LLM Security/a>, a hrefhttps://blog.includesecurity.com/tag/machine-learning-security/ reltag>Machine Learning Security/a>, a hrefhttps://blog.includesecurity.com/tag/mitigating-2/ reltag>Mitigating/a>, a hrefhttps://blog.includesecurity.com/tag/ml-hacking/ reltag>ML Hacking/a>, a hrefhttps://blog.includesecurity.com/tag/ml-pentesting/ reltag>ML Pentesting/a>, a hrefhttps://blog.includesecurity.com/tag/mlsec/ reltag>MLSec/a>, a hrefhttps://blog.includesecurity.com/tag/owasp/ reltag>OWASP/a>, a hrefhttps://blog.includesecurity.com/tag/owasp-llm/ reltag>OWASP LLM/a>, a hrefhttps://blog.includesecurity.com/tag/prompt-injection/ reltag>prompt injection/a>/span> span classcomments-link>span classgp-icon icon-comments>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM132.838 329.973a435.298 435.298 0 0 0 16.769-9.004c13.363-7.574 26.587-16.142 37.419-25.507 7.544.597 15.27.925 23.098.925 54.905 0 105.634-15.311 143.285-41.28 23.728-16.365 43.115-37.692 54.155-62.645 54.739 22.205 91.498 63.272 91.498 110.286 0 42.186-29.558 79.498-75.09 102.828 23.46 49.216 75.09 101.709 75.09 101.709s-115.837-38.35-154.424-78.46c-9.956 1.12-20.297 1.758-30.793 1.758-88.727 0-162.927-43.071-181.007-100.61z fill-rulenonzero/> path dM383.371 132.502c0 70.603-82.961 127.787-185.216 127.787-10.496 0-20.837-.639-30.793-1.757-38.587 40.093-154.424 78.429-154.424 78.429s51.63-52.472 75.09-101.67c-45.532-23.321-75.09-60.619-75.09-102.79C12.938 61.9 95.9 4.716 198.155 4.716 300.41 4.715 383.37 61.9 383.37 132.502z fill-rulenonzero /> /svg>/span>a hrefhttps://blog.includesecurity.com/2024/02/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers-part-2/#respond>Leave a comment/a>/span> /footer> /div>/article>article idpost-1905 classpost-1905 post type-post status-publish format-standard has-post-thumbnail hentry category-security-consulting category-uncategorized tag-ai-injection-2 tag-aisec tag-llm-security-2 tag-machine-learning-security tag-minimizing-risk-2 tag-mitigating-2 tag-mlsec tag-prompt-injection itemtypehttps://schema.org/CreativeWork itemscope> div classinside-article> header classentry-header> h2 classentry-title itempropheadline>a hrefhttps://blog.includesecurity.com/2024/01/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers/ relbookmark>Improving LLM Security Against Prompt Injection: AppSec Guidance For Pentesters and Developers/a>/h2> div classentry-meta> span classposted-on>time classupdated datetime2024-02-08T20:07:26-05:00 itempropdateModified>February 8, 2024/time>time classentry-date published datetime2024-01-23T15:36:10-05:00 itempropdatePublished>January 23, 2024/time>/span> span classbyline> — span classauthor vcard itempropauthor itemtypehttps://schema.org/Person itemscope>span classauthor-name itempropname>Abraham Kang/span>/span>/span> /div> /header> div classpost-image> a hrefhttps://blog.includesecurity.com/2024/01/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers/> img width614 height614 srchttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/01/PromptInjection.png?fit614%2C614&ssl1 classattachment-full size-full wp-post-image alt itempropimage decodingasync loadinglazy srcsethttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/01/PromptInjection.png?w614&ssl1 614w, https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/01/PromptInjection.png?resize300%2C300&ssl1 300w, https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/01/PromptInjection.png?resize150%2C150&ssl1 150w sizes(max-width: 614px) 100vw, 614px data-attachment-id1972 data-permalinkhttps://blog.includesecurity.com/2024/01/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers/promptinjection/#main data-orig-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/01/PromptInjection.png?fit614%2C614&ssl1 data-orig-size614,614 data-comments-opened1 data-image-meta{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0"} data-image-titlePromptInjection data-image-description data-image-caption data-medium-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/01/PromptInjection.png?fit300%2C300&ssl1 data-large-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2024/01/PromptInjection.png?fit614%2C614&ssl1 tabindex0 rolebutton /> /a> /div> div classentry-summary itemproptext> p>Many developers are leveraging LLMs without taking advantage of system roles, making their applications vulnerable by design. Security researches may be missing severe issues with prompt design and implementation by not testing the LLM APIs and focusing on the web user interfaces of LLM providers. Our latest blog post provides prescriptive advice to LLM application developers to help them minimize the security risk of their applications. It also helps security researchers focus on the issues that are important to developers of LLM applications. This post is the first in a series of two, where in future posts we’ll cover the concept of attention in transformer models./p> /div> footer classentry-meta> span classcat-links>span classgp-icon icon-categories>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM0 112c0-26.51 21.49-48 48-48h110.014a48 48 0 0 1 43.592 27.907l12.349 26.791A16 16 0 0 0 228.486 128H464c26.51 0 48 21.49 48 48v224c0 26.51-21.49 48-48 48H48c-26.51 0-48-21.49-48-48V112z fill-rulenonzero/> /svg>/span>span classscreen-reader-text>Categories /span>a hrefhttps://blog.includesecurity.com/category/security-consulting/ relcategory tag>security consulting/a>, a hrefhttps://blog.includesecurity.com/category/uncategorized/ relcategory tag>Uncategorized/a>/span> span classtags-links>span classgp-icon icon-tags>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM20 39.5c-8.836 0-16 7.163-16 16v176c0 4.243 1.686 8.313 4.687 11.314l224 224c6.248 6.248 16.378 6.248 22.626 0l176-176c6.244-6.244 6.25-16.364.013-22.615l-223.5-224A15.999 15.999 0 0 0 196.5 39.5H20zm56 96c0-13.255 10.745-24 24-24s24 10.745 24 24-10.745 24-24 24-24-10.745-24-24z/> path dM259.515 43.015c4.686-4.687 12.284-4.687 16.97 0l228 228c4.686 4.686 4.686 12.284 0 16.97l-180 180c-4.686 4.687-12.284 4.687-16.97 0-4.686-4.686-4.686-12.284 0-16.97L479.029 279.5 259.515 59.985c-4.686-4.686-4.686-12.284 0-16.97z fill-rulenonzero/> /svg>/span>span classscreen-reader-text>Tags /span>a hrefhttps://blog.includesecurity.com/tag/ai-injection-2/ reltag>AI Injection/a>, a hrefhttps://blog.includesecurity.com/tag/aisec/ reltag>AISec/a>, a hrefhttps://blog.includesecurity.com/tag/llm-security-2/ reltag>LLM Security/a>, a hrefhttps://blog.includesecurity.com/tag/machine-learning-security/ reltag>Machine Learning Security/a>, a hrefhttps://blog.includesecurity.com/tag/minimizing-risk-2/ reltag>Minimizing Risk/a>, a hrefhttps://blog.includesecurity.com/tag/mitigating-2/ reltag>Mitigating/a>, a hrefhttps://blog.includesecurity.com/tag/mlsec/ reltag>MLSec/a>, a hrefhttps://blog.includesecurity.com/tag/prompt-injection/ reltag>prompt injection/a>/span> span classcomments-link>span classgp-icon icon-comments>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM132.838 329.973a435.298 435.298 0 0 0 16.769-9.004c13.363-7.574 26.587-16.142 37.419-25.507 7.544.597 15.27.925 23.098.925 54.905 0 105.634-15.311 143.285-41.28 23.728-16.365 43.115-37.692 54.155-62.645 54.739 22.205 91.498 63.272 91.498 110.286 0 42.186-29.558 79.498-75.09 102.828 23.46 49.216 75.09 101.709 75.09 101.709s-115.837-38.35-154.424-78.46c-9.956 1.12-20.297 1.758-30.793 1.758-88.727 0-162.927-43.071-181.007-100.61z fill-rulenonzero/> path dM383.371 132.502c0 70.603-82.961 127.787-185.216 127.787-10.496 0-20.837-.639-30.793-1.757-38.587 40.093-154.424 78.429-154.424 78.429s51.63-52.472 75.09-101.67c-45.532-23.321-75.09-60.619-75.09-102.79C12.938 61.9 95.9 4.716 198.155 4.716 300.41 4.715 383.37 61.9 383.37 132.502z fill-rulenonzero /> /svg>/span>a hrefhttps://blog.includesecurity.com/2024/01/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers/#respond>Leave a comment/a>/span> /footer> /div>/article>article idpost-1812 classpost-1812 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized itemtypehttps://schema.org/CreativeWork itemscope> div classinside-article> header classentry-header> h2 classentry-title itempropheadline>a hrefhttps://blog.includesecurity.com/2023/10/attorney-client-privilege-penetration-testing-results-reports/ relbookmark>Think that having your lawyer engage your penetration testing consultancy will help you? Think again./a>/h2> div classentry-meta> span classposted-on>time classupdated datetime2024-02-29T04:39:01-05:00 itempropdateModified>February 29, 2024/time>time classentry-date published datetime2023-10-26T12:00:00-04:00 itempropdatePublished>October 26, 2023/time>/span> span classbyline> — span classauthor vcard itempropauthor itemtypehttps://schema.org/Person itemscope>span classauthor-name itempropname>IncludeSec/span>/span>/span> /div> /header> div classpost-image> a hrefhttps://blog.includesecurity.com/2023/10/attorney-client-privilege-penetration-testing-results-reports/> img width470 height337 srchttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2023/10/Confidential-Pentest-Report-thumbnail.png?fit470%2C337&ssl1 classattachment-full size-full wp-post-image alt itempropimage decodingasync loadinglazy srcsethttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2023/10/Confidential-Pentest-Report-thumbnail.png?w470&ssl1 470w, https://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2023/10/Confidential-Pentest-Report-thumbnail.png?resize300%2C215&ssl1 300w sizes(max-width: 470px) 100vw, 470px data-attachment-id1830 data-permalinkhttps://blog.includesecurity.com/2023/10/attorney-client-privilege-penetration-testing-results-reports/confidential-pentest-report-thumbnail/#main data-orig-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2023/10/Confidential-Pentest-Report-thumbnail.png?fit470%2C337&ssl1 data-orig-size470,337 data-comments-opened1 data-image-meta{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0"} data-image-titleConfidential Pentest Report-thumbnail data-image-description data-image-caption data-medium-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2023/10/Confidential-Pentest-Report-thumbnail.png?fit300%2C215&ssl1 data-large-filehttps://i0.wp.com/blog.includesecurity.com/wp-content/uploads/2023/10/Confidential-Pentest-Report-thumbnail.png?fit470%2C337&ssl1 tabindex0 rolebutton /> /a> /div> div classentry-summary itemproptext> p>Guest Post: Neil Jacobs (deals with cyber law stuff) Many companies engage their pen testing companies through their lawyers, ie, the lawyers themselves actually engage the pentester (and not the client), and the lawyers provide the pen test results to the client usually via a report. The thinking behind this is that doing so will … a titleThink that having your lawyer engage your penetration testing consultancy will help you? Think again. classread-more hrefhttps://blog.includesecurity.com/2023/10/attorney-client-privilege-penetration-testing-results-reports/ aria-labelMore on Think that having your lawyer engage your penetration testing consultancy will help you? Think again.>Read more/a>/p> /div> footer classentry-meta> span classcat-links>span classgp-icon icon-categories>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM0 112c0-26.51 21.49-48 48-48h110.014a48 48 0 0 1 43.592 27.907l12.349 26.791A16 16 0 0 0 228.486 128H464c26.51 0 48 21.49 48 48v224c0 26.51-21.49 48-48 48H48c-26.51 0-48-21.49-48-48V112z fill-rulenonzero/> /svg>/span>span classscreen-reader-text>Categories /span>a hrefhttps://blog.includesecurity.com/category/uncategorized/ relcategory tag>Uncategorized/a>/span> span classcomments-link>span classgp-icon icon-comments>svg viewBox0 0 512 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM132.838 329.973a435.298 435.298 0 0 0 16.769-9.004c13.363-7.574 26.587-16.142 37.419-25.507 7.544.597 15.27.925 23.098.925 54.905 0 105.634-15.311 143.285-41.28 23.728-16.365 43.115-37.692 54.155-62.645 54.739 22.205 91.498 63.272 91.498 110.286 0 42.186-29.558 79.498-75.09 102.828 23.46 49.216 75.09 101.709 75.09 101.709s-115.837-38.35-154.424-78.46c-9.956 1.12-20.297 1.758-30.793 1.758-88.727 0-162.927-43.071-181.007-100.61z fill-rulenonzero/> path dM383.371 132.502c0 70.603-82.961 127.787-185.216 127.787-10.496 0-20.837-.639-30.793-1.757-38.587 40.093-154.424 78.429-154.424 78.429s51.63-52.472 75.09-101.67c-45.532-23.321-75.09-60.619-75.09-102.79C12.938 61.9 95.9 4.716 198.155 4.716 300.41 4.715 383.37 61.9 383.37 132.502z fill-rulenonzero /> /svg>/span>a hrefhttps://blog.includesecurity.com/2023/10/attorney-client-privilege-penetration-testing-results-reports/#respond>Leave a comment/a>/span> /footer> /div>/article> nav idnav-below classpaging-navigation> span classscreen-reader-text>Post navigation/span> div classnav-previous> span classgp-icon icon-arrow>svg viewBox0 0 330 512 aria-hiddentrue roleimg version1.1 xmlnshttp://www.w3.org/2000/svg xmlns:xlinkhttp://www.w3.org/1999/xlink width1em height1em> path dM305.913 197.085c0 2.266-1.133 4.815-2.833 6.514L171.087 335.593c-1.7 1.7-4.249 2.832-6.515 2.832s-4.815-1.133-6.515-2.832L26.064 203.599c-1.7-1.7-2.832-4.248-2.832-6.514s1.132-4.816 2.832-6.515l14.162-14.163c1.7-1.699 3.966-2.832 6.515-2.832 2.266 0 4.815 1.133 6.515 2.832l111.316 111.317 111.316-111.317c1.7-1.699 4.249-2.832 6.515-2.832s4.815 1.133 6.515 2.832l14.162 14.163c1.7 1.7 2.833 4.249 2.833 6.515z fill-rulenonzero/> /svg>/span> span classprev titlePrevious>a hrefhttps://blog.includesecurity.com/page/2/ >Older posts/a>/span> /div> div classnav-links>span aria-currentpage classpage-numbers current>span classscreen-reader-text>Page/span>1/span>a classpage-numbers hrefhttps://blog.includesecurity.com/page/2/>span classscreen-reader-text>Page/span>2/a>span classpage-numbers dots>…/span>a classpage-numbers hrefhttps://blog.includesecurity.com/page/7/>span classscreen-reader-text>Page/span>7/a>a classnext page-numbers hrefhttps://blog.includesecurity.com/page/2/>Next span aria-hiddentrue>→/span>/a>/div> /nav> /main> /div> /div>/div>!-- -->style> .sd-social-icon .sd-content ul li a.sd-button>span { margin-left: 0; } /style>script defer idbilmur data-providerwordpress.com data-serviceatomic srchttps://s0.wp.com/wp-content/js/bilmur.min.js?m202428>/script> div idjp-carousel-loading-overlay> div idjp-carousel-loading-wrapper> span idjp-carousel-library-loading> /span> /div> /div> div classjp-carousel-overlay styledisplay: none;> div classjp-carousel-container> !-- The Carousel Swiper --> div classjp-carousel-wrap swiper-container jp-carousel-swiper-container jp-carousel-transitions itemscope itemtypehttps://schema.org/ImageGallery> div classjp-carousel swiper-wrapper>/div> div classjp-swiper-button-prev swiper-button-prev> svg width25 height24 viewBox0 0 25 24 fillnone xmlnshttp://www.w3.org/2000/svg> mask idmaskPrev mask-typealpha maskUnitsuserSpaceOnUse x8 y6 width9 height12> path dM16.2072 16.59L11.6496 12L16.2072 7.41L14.8041 6L8.8335 12L14.8041 18L16.2072 16.59Z fillwhite/> /mask> g maskurl(#maskPrev)> rect x0.579102 width23.8823 height24 fill#FFFFFF/> /g> /svg> /div> div classjp-swiper-button-next swiper-button-next> svg width25 height24 viewBox0 0 25 24 fillnone xmlnshttp://www.w3.org/2000/svg> mask idmaskNext mask-typealpha maskUnitsuserSpaceOnUse x8 y6 width8 height12> path dM8.59814 16.59L13.1557 12L8.59814 7.41L10.0012 6L15.9718 12L10.0012 18L8.59814 16.59Z fillwhite/> /mask> g maskurl(#maskNext)> rect x0.34375 width23.8822 height24 fill#FFFFFF/> /g> /svg> /div> /div> !-- The main close buton --> div classjp-carousel-close-hint> svg width25 height24 viewBox0 0 25 24 fillnone xmlnshttp://www.w3.org/2000/svg> mask idmaskClose mask-typealpha maskUnitsuserSpaceOnUse x5 y5 width15 height14> path dM19.3166 6.41L17.9135 5L12.3509 10.59L6.78834 5L5.38525 6.41L10.9478 12L5.38525 17.59L6.78834 19L12.3509 13.41L17.9135 19L19.3166 17.59L13.754 12L19.3166 6.41Z fillwhite/> /mask> g maskurl(#maskClose)> rect x0.409668 width23.8823 height24 fill#FFFFFF/> /g> /svg> /div> !-- Image info, comments and meta --> div classjp-carousel-info> div classjp-carousel-info-footer> div classjp-carousel-pagination-container> div classjp-swiper-pagination swiper-pagination>/div> div classjp-carousel-pagination>/div> /div> div classjp-carousel-photo-title-container> h2 classjp-carousel-photo-caption>/h2> /div> div classjp-carousel-photo-icons-container> a href# classjp-carousel-icon-btn jp-carousel-icon-info aria-labelToggle photo metadata visibility> span classjp-carousel-icon> svg width25 height24 viewBox0 0 25 24 fillnone xmlnshttp://www.w3.org/2000/svg> mask idmaskInfo mask-typealpha maskUnitsuserSpaceOnUse x2 y2 width21 height20> path fill-ruleevenodd clip-ruleevenodd dM12.7537 2C7.26076 2 2.80273 6.48 2.80273 12C2.80273 17.52 7.26076 22 12.7537 22C18.2466 22 22.7046 17.52 22.7046 12C22.7046 6.48 18.2466 2 12.7537 2ZM11.7586 7V9H13.7488V7H11.7586ZM11.7586 11V17H13.7488V11H11.7586ZM4.79292 12C4.79292 16.41 8.36531 20 12.7537 20C17.142 20 20.7144 16.41 20.7144 12C20.7144 7.59 17.142 4 12.7537 4C8.36531 4 4.79292 7.59 4.79292 12Z fillwhite/> /mask> g maskurl(#maskInfo)> rect x0.8125 width23.8823 height24 fill#FFFFFF/> /g> /svg> /span> /a> a href# classjp-carousel-icon-btn jp-carousel-icon-comments aria-labelToggle photo comments visibility> span classjp-carousel-icon> svg width25 height24 viewBox0 0 25 24 fillnone xmlnshttp://www.w3.org/2000/svg> mask idmaskComments mask-typealpha maskUnitsuserSpaceOnUse x2 y2 width21 height20> path fill-ruleevenodd clip-ruleevenodd dM4.3271 2H20.2486C21.3432 2 22.2388 2.9 22.2388 4V16C22.2388 17.1 21.3432 18 20.2486 18H6.31729L2.33691 22V4C2.33691 2.9 3.2325 2 4.3271 2ZM6.31729 16H20.2486V4H4.3271V18L6.31729 16Z fillwhite/> /mask> g maskurl(#maskComments)> rect x0.34668 width23.8823 height24 fill#FFFFFF/> /g> /svg> span classjp-carousel-has-comments-indicator aria-labelThis image has comments.>/span> /span> /a> /div> /div> div classjp-carousel-info-extra> div classjp-carousel-info-content-wrapper> div classjp-carousel-photo-title-container> h2 classjp-carousel-photo-title>/h2> /div> div classjp-carousel-comments-wrapper> div idjp-carousel-comments-loading> span>Loading Comments.../span> /div> div classjp-carousel-comments>/div> div idjp-carousel-comment-form-container> span idjp-carousel-comment-form-spinner> /span> div idjp-carousel-comment-post-results>/div> form idjp-carousel-comment-form> label forjp-carousel-comment-form-comment-field classscreen-reader-text>Write a Comment.../label> textarea namecomment classjp-carousel-comment-form-field jp-carousel-comment-form-textarea idjp-carousel-comment-form-comment-field placeholderWrite a Comment... >/textarea> div idjp-carousel-comment-form-submit-and-info-wrapper> div idjp-carousel-comment-form-commenting-as> fieldset> label forjp-carousel-comment-form-email-field>Email (Required)/label> input typetext nameemail classjp-carousel-comment-form-field jp-carousel-comment-form-text-field idjp-carousel-comment-form-email-field /> /fieldset> fieldset> label forjp-carousel-comment-form-author-field>Name (Required)/label> input typetext nameauthor classjp-carousel-comment-form-field jp-carousel-comment-form-text-field idjp-carousel-comment-form-author-field /> /fieldset> fieldset> label forjp-carousel-comment-form-url-field>Website/label> input typetext nameurl classjp-carousel-comment-form-field jp-carousel-comment-form-text-field idjp-carousel-comment-form-url-field /> /fieldset> /div> input typesubmit namesubmit classjp-carousel-comment-form-button idjp-carousel-comment-form-button-submit valuePost Comment /> /div> /form> /div> /div> div classjp-carousel-image-meta> div classjp-carousel-title-and-caption> div classjp-carousel-photo-info> h3 classjp-carousel-caption itempropcaption description>/h3> /div> div classjp-carousel-photo-description>/div> /div> ul classjp-carousel-image-exif styledisplay: none;>/ul> a classjp-carousel-image-download href# target_blank styledisplay: none;> svg width25 height24 viewBox0 0 25 24 fillnone xmlnshttp://www.w3.org/2000/svg> mask idmask0 mask-typealpha maskUnitsuserSpaceOnUse x3 y3 width19 height18> path fill-ruleevenodd clip-ruleevenodd dM5.84615 5V19H19.7775V12H21.7677V19C21.7677 20.1 20.8721 21 19.7775 21H5.84615C4.74159 21 3.85596 20.1 3.85596 19V5C3.85596 3.9 4.74159 3 5.84615 3H12.8118V5H5.84615ZM14.802 5V3H21.7677V10H19.7775V6.41L9.99569 16.24L8.59261 14.83L18.3744 5H14.802Z fillwhite/> /mask> g maskurl(#mask0)> rect x0.870605 width23.8823 height24 fill#FFFFFF/> /g> /svg> span classjp-carousel-download-text>/span> /a> div classjp-carousel-image-map styledisplay: none;>/div> /div> /div> /div> /div> /div> /div> script idjetpack-carousel-js-extra>var jetpackSwiperLibraryPath {url:https:\/\/blog.includesecurity.com\/wp-content\/plugins\/jetpack\/_inc\/build\/carousel\/swiper-bundle.min.js};var jetpackCarouselStrings {widths:370,700,1000,1200,1400,2000,is_logged_in:,lang:en,ajaxurl:https:\/\/blog.includesecurity.com\/wp-admin\/admin-ajax.php,nonce:fc878e7f1a,display_exif:1,display_comments:1,single_image_gallery:1,single_image_gallery_media_file:,background_color:black,comment:Comment,post_comment:Post Comment,write_comment:Write a Comment...,loading_comments:Loading Comments...,download_original:View full size span class\photo-size\>{0}span class\photo-size-times\>\u00d7\/span>{1}\/span>,no_comment_text:Please be sure to submit some text with your comment.,no_comment_email:Please provide an email address to comment.,no_comment_author:Please provide your name to comment.,comment_post_error:Sorry, but there was an error posting your comment. Please try again later.,comment_approved:Your comment was approved.,comment_unapproved:Your comment is in moderation.,camera:Camera,aperture:Aperture,shutter_speed:Shutter Speed,focal_length:Focal Length,copyright:Copyright,comment_registration:0,require_name_email:1,login_url:https:\/\/blog.includesecurity.com\/wp-login.php?redirect_tohttps%3A%2F%2Fblog.includesecurity.com%2F2024%2F04%2Fcoverage-guided-fuzzing-extending-instrumentation%2F,blog_id:1,meta_data:camera,aperture,shutter_speed,focal_length,copyright};/script>script srchttps://blog.includesecurity.com/wp-content/plugins/jetpack/_inc/build/carousel/jetpack-carousel.min.js?ver13.7-a.1 idjetpack-carousel-js>/script>!--if lte IE 11>script srchttps://blog.includesecurity.com/wp-content/themes/generatepress/assets/js/classList.min.js?ver3.0.2 idgenerate-classlist-js>/script>!endif-->script idgenerate-main-js-extra>var generatepressMenu {toggleOpenedSubMenus:1,openSubMenuLabel:Open Sub-Menu,closeSubMenuLabel:Close Sub-Menu};/script>script srchttps://blog.includesecurity.com/wp-content/themes/generatepress/assets/js/main.min.js?ver3.0.2 idgenerate-main-js>/script>script srchttps://blog.includesecurity.com/wp-content/plugins/enlighter/cache/enlighterjs.min.js?vervcFzeYSNeR1CecZ idenlighterjs-js>/script>script idenlighterjs-js-after>!function(e,n){if(undefined!typeof EnlighterJS){var o{selectors:{block:pre.EnlighterJSRAW,inline:code.EnlighterJSRAW},options:{indent:4,ampersandCleanup:true,linehover:false,rawcodeDbclick:false,textOverflow:break,linenumbers:false,theme:droide,language:generic,retainCssClasses:false,collapse:false,toolbarOuter:,toolbarTop:{BTN_RAW}{BTN_COPY}{BTN_WINDOW}{BTN_WEBSITE},toolbarBottom:}};(e.EnlighterJSINITfunction(){EnlighterJS.init(o.selectors.block,o.selectors.inline,o.options)})()}else{(n&&(n.error||n.log)||function(){})(Error: EnlighterJS resources not loaded yet!)}}(window,console);/script>script srchttps://stats.wp.com/e-202428.js idjetpack-stats-js data-wp-strategydefer>/script>script idjetpack-stats-js-after>_stq window._stq || ;_stq.push( view, JSON.parse({\v\:\ext\,\blog\:\145744988\,\post\:\0\,\tz\:\-4\,\srv\:\blog.includesecurity.com\,\hp\:\atomic\,\ac\:\2\,\amp\:\0\,\j\:\1:13.7-a.1\}) );_stq.push( clickTrackerInit, 145744988, 0 );/script>/body>/html>!-- generated in 0.270 seconds 89222 bytes batcached for 300 seconds-->
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]