Article: Sigreturn Oriented Programming (Erik Bosman's OHM2013 work) - published almost 11 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/1rpvzh/sigreturn_oriented_programming_erik_bosmans/ Published: 2013 11 29 17:19:55 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
Article: KASLR Bypass Mitigations in Windows 8.1 - Alex Ionescu (November 2013) - published almost 11 years ago. Content: submitted by /u/HockeyInJune [link] [comments] https://www.reddit.com/r/vrd/comments/1rpsj5/kaslr_bypass_mitigations_in_windows_81_alex/ Published: 2013 11 29 16:29:41 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: XPATH Injection Tutorial - published almost 11 years ago. Content: XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attacker to inject XPath elements in a query that uses this language. Some of the possible goals are to bypass authentication or access information in an unauthorized manner. We are gonna learn using simple example. Downloa... https://tipstrickshack.blogspot.com/2013/11/xpath-injection-tutorial.html Published: 2013 11 29 13:14:00 Received: 2024 02 20 16:42:59 Feed: Hacking and Tricks Source: Hacking and Tricks Category: Cyber Security Topic: Cyber Security |
|
Article: Episode #172: Who said bigger is better? - published almost 11 years ago. Content: Tim sweats the small stuff Ted S. writes in: "I have a number of batch scripts which turn a given input file into a configurable amount of versions, all of which will contain identical data content, but none of which, ideally, contain the same byte content. My problem is, how do I, using *only* XP+ cmd (no other scripting - PowerShell, jsh, wsh, &c), ... http://blog.commandlinekungfu.com/2013/11/episode-172-who-said-bigger-is-better.html Published: 2013 11 26 09:18:00 Received: 2023 03 31 08:44:32 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Broken Authentication & Session Management in Mutillidae - published about 11 years ago. Content: Broken Authentication and Session Management is on number 2 in OWASP Top 10 vulnerability list 2013. In mutillidae , it contain three subsection. Authentication Bypass Privilege Escalation Username Enumeration We have already covered Username enumeration in last article & we got valid username list which exist in database. Today we are going to use a... https://tipstrickshack.blogspot.com/2013/11/broken-authentication-session.html Published: 2013 11 20 08:34:00 Received: 2024 02 20 16:42:59 Feed: Hacking and Tricks Source: Hacking and Tricks Category: Cyber Security Topic: Cyber Security |
|
Article: Critical Infrastructure Beyond the Power Grid - published about 11 years ago. Content: The term "critical infrastructure" has earned its spot on the board of our ongoing game of cyber bingo--right next to "Digital Pearl Harbor," "Cyber 9/11," "SCADA" and "Stuxnet." With "critical infrastructure" thrown about in references to cyber threats nearly every week, we thought it was time for a closer look at just what the te... http://www.fireeye.com/blog/threat-research/2013/11/critical-infrastructure-power-grid.html Published: 2013 11 19 21:26:40 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: How Cyber Insurance Can Guard Enterprises Against Class Action Lawsuits - published about 11 years ago. Content: https://www.securitymagazine.com/articles/84951-how-cyber-insurance-can-guard-enterprises-against-class-action-lawsuits Published: 2013 11 18 06:00:00 Received: 2021 04 25 02:14:07 Feed: Security Magazine – Reports Source: Security Magazine Category: Reports Topic: Cyber Security |
|
Article: How to solve compile error in veil? - published about 11 years ago. Content: As you know, veil is AV evasion framework for metasploit payload. On the 15th of every month, for the next year, at least one new payload module will be released.Yesterday they released two new payload. pure windows/meterpreter/reverse_tcp stager, no shellcode pure windows/meterpreter/reverse_tcp windows service stager compatible with psexec, no shellcode... https://tipstrickshack.blogspot.com/2013/11/how-to-solve-compile-error-in-veil.html Published: 2013 11 16 11:59:00 Received: 2024 02 20 16:43:00 Feed: Hacking and Tricks Source: Hacking and Tricks Category: Cyber Security Topic: Cyber Security |
Article: Username Enumeration in Mutillidae using Burpe Intruder. - published about 11 years ago. Content: Mutillidae is a free, open source, vulnerable web-application providing a target for web-security tester. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. Username Enumeration :- We have an application that will reveal to us when a username exists on the system which can be used in further step like brute-force account. In M... https://tipstrickshack.blogspot.com/2013/11/username-enumeration-in-mutillidae.html Published: 2013 11 11 07:46:00 Received: 2024 02 20 16:43:00 Feed: Hacking and Tricks Source: Hacking and Tricks Category: Cyber Security Topic: Cyber Security |
Click to Open Code Editor