Article: HITB2014AMS – Day 2 – On Her Majesty’s Secret Service: GRX & A Spy Agency - published over 10 years ago. Content: https://www.corelan.be/index.php/2014/05/30/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency/?utm_source=rss&utm_medium=rss&utm_campaign=hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency Published: 2014 05 30 13:13:22 Received: 2023 01 18 09:44:47 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
Article: HITB2014AMS – Day 2 – Exploring and Exploiting iOS Web Browsers - published over 10 years ago. Content: https://www.corelan.be/index.php/2014/05/30/hitb2014ams-day-2-exploring-and-exploiting-ios-web-browsers/?utm_source=rss&utm_medium=rss&utm_campaign=hitb2014ams-day-2-exploring-and-exploiting-ios-web-browsers Published: 2014 05 30 10:19:05 Received: 2023 01 18 09:44:48 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
|
Article: HITB2014AMS – Day 2 – Keynote 4: Hack It Forward - published over 10 years ago. Content: https://www.corelan.be/index.php/2014/05/30/hitb2014ams-day-2-keynote-4-hack-it-forward/?utm_source=rss&utm_medium=rss&utm_campaign=hitb2014ams-day-2-keynote-4-hack-it-forward Published: 2014 05 30 08:32:09 Received: 2023 01 18 09:44:48 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
|
Article: Episode #178: Luhn-acy - published over 10 years ago. Content: Hal limbers up in the dojo To maintain our fighting trim here in the Command Line Kung Fu dojo, we like to set little challenges for ourselves from time to time. Of course, we prefer it when our loyal readers send us ideas, so keep those emails coming! Really... please oh please oh please keep those emails coming... please, please, please... ahem, but I d... http://blog.commandlinekungfu.com/2014/05/not-ready-yet-episode-178-luhn-acy.html Published: 2014 05 26 09:00:00 Received: 2023 03 31 08:44:32 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Hacking Windows 95, part 2 - published over 10 years ago. Content: In the Hacking Windows 95, part 1 blog post, we covered that through a nasty bug affecting Windows 95/98/ME, the share password can be guessed in no time. In this article, I'm going to try to use this vulnerability to achieve remote code execution (with the help of publicly available tools only). The first thing we can do when we have read access to the Wi... https://jumpespjump.blogspot.com/2014/05/hacking-windows-95-part-2.html Published: 2014 05 23 15:29:00 Received: 2024 03 12 23:22:35 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
|
Article: Owning the Database with SQLMAP and METASPLOIT - published over 10 years ago. Content: Today I will be trying to teach you how to use it from Linux platform to take advantage of all that it has to offer. We will begin by booting up our favorite Linux distro of choice; I will be using BackTrack 4R2 for purposes of this tutorial - it is not required but helps because everything is mostly setup already (mostly Metasploit). Once you have you... http://hacking-share.blogspot.com/2014/05/owning-database-with-sqlmap-and.html Published: 2014 05 06 16:00:00 Received: 2023 04 02 10:42:09 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: KLEE used to find NULL pointer dereference in OpenSSL - published over 10 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/24i2zh/klee_used_to_find_null_pointer_dereference_in/ Published: 2014 05 02 00:25:08 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: Episode #177: There and Back Again - published over 10 years ago. Content: Hal finds some old mail Way, way back after Episode #170 Tony Reusser sent us a follow-up query. If you recall, Episode #170 showed how to change files named "fileaa", "fileab", "fileac", etc to files named "file.001", "file.002", "file.003". Tony's question was how to go back the other way-- from "file.001" to "fileaa", "file.002" to "fileab", and so on.... http://blog.commandlinekungfu.com/2014/04/episode-177-there-and-back-again.html Published: 2014 05 01 01:01:00 Received: 2023 03 31 08:44:32 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Click to Open Code Editor