<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vulnerability | RobWillis.info</title>
	<atom:link href="/tag/vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>#yolosec</description>
	<lastBuildDate>Fri, 09 May 2025 08:11:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>VMware vCenter CVE-2021-21972 Scanner</title>
		<link>/2021/02/vmware-vcenter-cve-2021-21972-scan-tool/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sat, 27 Feb 2021 10:31:52 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[PowerShell/Scripting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[CVE-2021-21972]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[scan]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[vCenter]]></category>
		<category><![CDATA[VMWare]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">/?p=5318</guid>

					<description><![CDATA[<p>In this post, I am releasing a PowerShell POC script that will scan the specified target hosts and attempt to detect those that are vulnerable to VMware vCenter CVE-2021-21972. You can find the script, Invoke-CVE-2021-21972-Scan.ps1, on my github here: https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972 The script executes in the following order: Create a log file, default log name is [&#8230;]</p>
The post <a href="/2021/02/vmware-vcenter-cve-2021-21972-scan-tool/">VMware vCenter CVE-2021-21972 Scanner</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Apache Struts CVE-2018-11776 &#8211; Testing, Analyzing, &#038; Detection</title>
		<link>/2018/08/apache-struts-cve-2018-11776-testing-analyzing-detection/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 13:49:06 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[CVE-2018-11776]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Pcap]]></category>
		<category><![CDATA[Struts]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[Tomcat8]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3843</guid>

					<description><![CDATA[<p>Intro Any time a new Apache Struts vulnerability comes out it should be taken pretty seriously as there are many &#8220;mission critical&#8221; systems that are leveraging the framework, with a considerable amount of them being public facing. Unfortunately, as a former Sys Ad I can tell you that many of these systems will go on [&#8230;]</p>
The post <a href="/2018/08/apache-struts-cve-2018-11776-testing-analyzing-detection/">Apache Struts CVE-2018-11776 – Testing, Analyzing, & Detection</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Exploiting Apache Struts &#8211; CVE-2017-9805</title>
		<link>/2017/09/exploiting-apache-struts-cve-2017-9805/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sat, 16 Sep 2017 03:53:16 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[CVE-2017-9805]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Python]]></category>
		<category><![CDATA[Reverse Shell]]></category>
		<category><![CDATA[Struts]]></category>
		<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3255</guid>

					<description><![CDATA[<p>CVE-2017-9805 is yet another very legitimate vulnerability in the Apache Struts framework. In the video, I demonstrate how easy it is to run a simple public python script against a vulnerable remote server, ultimately resulting in a reverse shell back to the attacker. In this post, I will cover all the steps shown in the [&#8230;]</p>
The post <a href="/2017/09/exploiting-apache-struts-cve-2017-9805/">Exploiting Apache Struts – CVE-2017-9805</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>IIS 7/7.5 Hardening SSL TLS &#8211; Windows Server 2008 R2</title>
		<link>/2013/09/iis-77-5-hardening-ssl-tls-windows-server-2008-r2/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sat, 21 Sep 2013 00:40:52 +0000</pubDate>
				<category><![CDATA[Servers]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[beast]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[hardening]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[tls]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=2098</guid>

					<description><![CDATA[<p>&#160;&#160;&#160;&#160;&#160;One of the first steps you should do when deploying a new public facing web server is hardening your server&#8217;s SSL/TLS connections. Disabling vulnerable protocols, ciphers, hashes and key exchange algorithms can help mitigate the now more common exploits like the BEAST attack. By default many weaker technologies are enabled, leaving IIS traffic vulnerable and [&#8230;]</p>
The post <a href="/2013/09/iis-77-5-hardening-ssl-tls-windows-server-2008-r2/">IIS 7/7.5 Hardening SSL TLS – Windows Server 2008 R2</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
