Tagged articles
3 articles
Page 1 of 1
Black & White Path
Black & White Path
May 12, 2026 · Information Security

From an External Weak Password to Full Internal Access: A School Network Penetration Walkthrough

The article details a step‑by‑step penetration test of an educational network, starting with a weak external credential on a virtual teaching lab, harvesting teacher IDs, exploiting default webvpn and SSLVPN logins, and ultimately reaching an internal WebLogic server, highlighting the danger of weak passwords in schools.

SSLVPNWebLogiceducation network
0 likes · 3 min read
From an External Weak Password to Full Internal Access: A School Network Penetration Walkthrough
Efficient Ops
Efficient Ops
Apr 19, 2018 · Information Security

How to Detect and Mitigate Oracle WebLogic CVE‑2018‑2628 Remote Code Execution

Oracle's April Critical Patch Update fixes a high‑severity remote code execution vulnerability (CVE‑2018‑2628) in WebLogic, and this guide explains the affected versions, impact scope, detection methods, and both official and interim protection measures using NIPS and next‑generation firewalls.

CVE-2018-2628NIPSSecurity Patch
0 likes · 9 min read
How to Detect and Mitigate Oracle WebLogic CVE‑2018‑2628 Remote Code Execution
ITPUB
ITPUB
Aug 11, 2014 · Information Security

Inside China’s Social Security System: Architecture, Security, and Performance Secrets

In this interview, senior database engineer Eric shares the three‑layer J2EE architecture, Oracle and WebLogic stack, security measures, high‑concurrency handling, disaster‑recovery practices, and performance‑tuning techniques used in China’s social security systems.

Performance OptimizationSystem ArchitectureWebLogic
0 likes · 13 min read
Inside China’s Social Security System: Architecture, Security, and Performance Secrets