August 18, 2015

A version of this post originally appeared at


One of the first steps when looking to gain access to a host, system, or application is to enumerat...

Scott Helme is a Security Consultant at Pentest Limited, but also has an active blog site ( and has recently launched a new service, a tool for reporting CSP and KPKP violations. The article below is written by Scott, and considers ju...

Please reload


  • Twitter Classic
  • Facebook Social Icon
  • YouTube Social  Icon
  • LinkedIn App Icon

© 2014-2020 BSides Manchester CIC