
code-white.com/blog
Preview meta tags from the code-white.com website.
Linked Hostnames
7- 59 links tocode-white.com
- 11 links towww.linkedin.com
- 10 links tobsky.app
- 10 links totwitter.com
- 1 link toinfosec.exchange
- 1 link toweb-cdn.bsky.app
- 1 link tox.com
Thumbnail

Search Engine Appearance
https://code-white.com/blog
CODE WHITE | Blog
CODE WHITE | Red Teaming & Attack Surface Management
Bing
CODE WHITE | Blog
https://code-white.com/blog
CODE WHITE | Red Teaming & Attack Surface Management
DuckDuckGo
https://code-white.com/blog
CODE WHITE | Blog
CODE WHITE | Red Teaming & Attack Surface Management
General Meta Tags
4- titleCODE WHITE | Red Teaming & Attack Surface Management
- charsetutf-8
- viewportwidth=device-width, initial-scale=1
- descriptionCODE WHITE | Red Teaming & Attack Surface Management
Open Graph Meta Tags
5- og:titleCODE WHITE | Blog
- og:descriptionExploits and explorations in the world of #ItSec, freshly delivered to your doorstep.
- og:typeblog
- og:urlhttps://code-white.com/blog/
- og:imagehttps://code-white.com/images/featured.png
Link Tags
20- alternatehttps://code-white.com/index.xml
- alternatehttps://code-white.com/blog/index.xml
- canonicalhttps://code-white.com/blog/
- stylesheethttps://code-white.com/css/header.css
- stylesheethttps://code-white.com/css/style.css
Links
93- https://bsky.app/intent/compose?text=Analyzing%20the%20Attack%20Surface%20of%20Ivanti%26%2339%3bs%20DSM%20Ivanti%26rsquo%3bs%20Desktop%20%26amp%3b%20Server%20Management%20%28DSM%29%20product%20is%20an%20old%20acquaintance%20that%20we%20have%20encountered%20in%20numerous%20red%20team%20and%0ainternal%20%e2%80%a6%20https%3a%2f%2fcode-white.com%2fblog%2fivanti-desktop-and-server-management%2f
- https://bsky.app/intent/compose?text=Attacks%20on%20Sysmon%20Revisited%20-%20SysmonEnte%20In%20this%20blogpost%20we%20demonstrate%20an%20attack%20on%20the%20integrity%20of%20Sysmon%20which%20generates%20a%20minimal%20amount%20of%20observable%20events%20making%20this%20attack%20%e2%80%a6%20https%3a%2f%2fcode-white.com%2fblog%2f2022-09-attacks-on-sysmon-revisited-sysmonente%2f
- https://bsky.app/intent/compose?text=Blindsiding%20auditd%20for%20Fun%20and%20Profit%20The%20Linux%20audit%20framework%20provides%20a%20powerful%20audit%20system%20for%20monitoring%20security%20relevant%20events%20on%20Linux%20operating%20systems.%20In%20this%20blogpost%2c%20we%20%e2%80%a6%20https%3a%2f%2fcode-white.com%2fblog%2f2023-08-blindsiding-auditd-for-fun-and-profit%2f
- https://bsky.app/intent/compose?text=Exploiting%20ASP.NET%20TemplateParser%20%e2%80%94%20Part%20I%3a%20Sitecore%20%28CVE-2023-35813%29%20The%20%3ccode%3eTemplateParser%3c%2fcode%3e%20is%20fundamental%20in%20ASP.NET%20Web%20Forms.%20It%20is%20used%20for%20parsing%20different%20ASP.NET%20source%20files%20such%20as%20%3ccode%3e%2a.aspx%3c%2fcode%3e%20and%20for%20parsing%20other%20%e2%80%a6%20https%3a%2f%2fcode-white.com%2fblog%2fexploiting-asp.net-templateparser-part-1%2f
- https://bsky.app/intent/compose?text=Exploiting%20ASP.NET%20TemplateParser%20%e2%80%94%20Part%20II%3a%20SharePoint%20%28CVE-2023-33160%29%20In%20Part%20I%2c%20we%20dug%20into%20the%20internals%20of%20the%20ASP.NET%20%3ccode%3eTemplateParser%3c%2fcode%3e%20and%20elaborated%20its%20capabilities%20in%20respect%20to%20exploitation.%0aIn%20this%20part%2c%20we%20will%20%e2%80%a6%20https%3a%2f%2fcode-white.com%2fblog%2fexploiting-asp.net-templateparser-part-2%2f