Risks of Using HTTP For Your Web Application

Risks of Using HTTP For Your Web Application

Risks of Using HTTP For Your Web Application For modern web applications, the average user will interact over a secure protocol for communication (i.e. HTTPS, or Hypertext Transfer Protocol Secure). However, it’s not uncommon to encounter a web application hosted in an internal corporate environment using the less secure HTTP (Hypertext Transfer Protocol) which communicates […]

How to Disable Machine Account Creation

Disabling Machine Account Creation Since Windows 2000, Microsoft has enabled the ability for all users to create up to 10 machine accounts by default. This is a “feature” implemented by Microsoft that inadvertently introduces potential vulnerabilities within an Active Directory environment. Secure deployment should ensure that Machine Account creation is limited to specific users or […]

What is a Web Application Penetration Test?

What is a Web Application Penetration Test? The Open Web Application Security Project (OWASP) defines a web application security test as “…an active analysis of the application for any weaknesses, technical flaws, or vulnerabilities”. This is an excellent definition of a web application penetration test, but this article will dive a bit deeper in why […]

Risks of a Large Attack Surface

A common theme amongst clients when conducting penetration tests is a large attack surface. Generally, the biggest risk is amongst externally exposed assets. However, this can be related to internal penetration tests and web application penetration tests. This blog post will briefly examine the biggest risks associated with a large attack surface. Unknown Assets It […]

What is an External Penetration Test?

What is an External Penetration Test? Before diving into what an external penetration test entails, let’s first recap what a penetration test involves. A penetration test simulates an attack on a network, application, device, location, controls, or humans in a controlled environment. Lucid Security conducts external penetration tests by simulating attacks on their internet-facing assets. […]

Preparing for an Upcoming Penetration Test

Preparing for an Upcoming Penetration Test An upcoming penetration test can stress any organization. Whether your company undergoes annual assessments or faces its first one, ensuring everything is in order is crucial. This article will guide you through preparing for your upcoming penetration test. Determining Scope Several factors influence your assessment’s scope. Consider these elements, […]

Lucid Security is a Veteran owned cybersecurity solutions company focused on offensive security and penetration testing. 

Give Us a Follow

Copyright Lucid Security, LLC ©2025
Lucid Security
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.