<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>exploit | RobWillis.info</title>
	<atom:link href="/tag/exploit/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>#yolosec</description>
	<lastBuildDate>Fri, 09 May 2025 08:11:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Apache Struts CVE-2018-11776 &#8211; Testing, Analyzing, &#038; Detection</title>
		<link>/2018/08/apache-struts-cve-2018-11776-testing-analyzing-detection/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 13:49:06 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[CVE-2018-11776]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Pcap]]></category>
		<category><![CDATA[Struts]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[Tomcat8]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3843</guid>

					<description><![CDATA[<p>Intro Any time a new Apache Struts vulnerability comes out it should be taken pretty seriously as there are many &#8220;mission critical&#8221; systems that are leveraging the framework, with a considerable amount of them being public facing. Unfortunately, as a former Sys Ad I can tell you that many of these systems will go on [&#8230;]</p>
The post <a href="/2018/08/apache-struts-cve-2018-11776-testing-analyzing-detection/">Apache Struts CVE-2018-11776 – Testing, Analyzing, & Detection</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Exploiting Apache Struts &#8211; CVE-2017-9805</title>
		<link>/2017/09/exploiting-apache-struts-cve-2017-9805/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sat, 16 Sep 2017 03:53:16 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[CVE-2017-9805]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Python]]></category>
		<category><![CDATA[Reverse Shell]]></category>
		<category><![CDATA[Struts]]></category>
		<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3255</guid>

					<description><![CDATA[<p>CVE-2017-9805 is yet another very legitimate vulnerability in the Apache Struts framework. In the video, I demonstrate how easy it is to run a simple public python script against a vulnerable remote server, ultimately resulting in a reverse shell back to the attacker. In this post, I will cover all the steps shown in the [&#8230;]</p>
The post <a href="/2017/09/exploiting-apache-struts-cve-2017-9805/">Exploiting Apache Struts – CVE-2017-9805</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Metasploit Framework basics on Kali Linux &#8211; Owning a Windows Server</title>
		<link>/2016/08/metasploit-framework-basics-on-kali-linux-owning-a-windows-server/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Thu, 18 Aug 2016 12:36:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Kali]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Metasploit]]></category>
		<category><![CDATA[MS08-067]]></category>
		<category><![CDATA[msf]]></category>
		<category><![CDATA[Payload]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=2912</guid>

					<description><![CDATA[<p>In this post I want to talk about the basics of using the Metasploit Framework that is included on the latest version of Kali Linux. If you don&#8217;t already know the Metasploit Framework is a project that makes writing and utilizing exploits relatively easy and it&#8217;s components are very modularized. Metasploit has everything you need [&#8230;]</p>
The post <a href="/2016/08/metasploit-framework-basics-on-kali-linux-owning-a-windows-server/">Metasploit Framework basics on Kali Linux – Owning a Windows Server</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>IIS 7/7.5 Hardening SSL TLS &#8211; Windows Server 2008 R2</title>
		<link>/2013/09/iis-77-5-hardening-ssl-tls-windows-server-2008-r2/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sat, 21 Sep 2013 00:40:52 +0000</pubDate>
				<category><![CDATA[Servers]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[beast]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[hardening]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[tls]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=2098</guid>

					<description><![CDATA[<p>&#160;&#160;&#160;&#160;&#160;One of the first steps you should do when deploying a new public facing web server is hardening your server&#8217;s SSL/TLS connections. Disabling vulnerable protocols, ciphers, hashes and key exchange algorithms can help mitigate the now more common exploits like the BEAST attack. By default many weaker technologies are enabled, leaving IIS traffic vulnerable and [&#8230;]</p>
The post <a href="/2013/09/iis-77-5-hardening-ssl-tls-windows-server-2008-r2/">IIS 7/7.5 Hardening SSL TLS – Windows Server 2008 R2</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
