Most people are comfortable with the idea of installing anti-virus
software and security programs on their home PC in order to ward off
hackers and malicious code. But with the rise of smart-phone technology
people have become complacent about the safety of the personal
information that they carry around on the multi-tasking device in their
pockets. You have to think of a smart phone as a small computer which,
as with all such devices, is vulnerable to hackers unless you take steps
to protect it.
Thursday, February 2, 2012
Wednesday, February 1, 2012
How to Hack Website database using XPath tech?
Everyday many website gets hacked by hackers but most of the hackers are
hacking those website just for popularity nothing else. Today i am
writing this tutorial on XPath Injection, in which i will explain you, How Hackers Hack Website Using XPath Injection. M4ERRHCQZ2PY
In a typical Web Application architecture, all data is stored on a Database server. This Database server store data in various formats like an LDAP, XML or RDBMS database. The application queries the server and accesses the information based on the user input.
Normally attackers try to extract more information than allowed by manipulating or using the query with specially crafted inputs.Here, in this tutorial we’ll be discussing XPATH Injection techniques to extract data from XML databases.
In a typical Web Application architecture, all data is stored on a Database server. This Database server store data in various formats like an LDAP, XML or RDBMS database. The application queries the server and accesses the information based on the user input.
Normally attackers try to extract more information than allowed by manipulating or using the query with specially crafted inputs.Here, in this tutorial we’ll be discussing XPATH Injection techniques to extract data from XML databases.
Web Security Scanner For Windows (32 bit & 64 bit)
Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes an intercepting proxy for interactive web application debugging. Vega attack modules are written in Javascript, users can easily modify them or write their own. This is the Windows 32-bit and 64-bit version.
Exploiting a cross-site scripting vulnerability on Facebook
Take a walk through most workplaces and you will surely notice
someone browsing a social networking site. No wonder that website
popularity services like Alexa rate Facebook the second most visited
website after Google and before Youtube! We trust these websites to
reflect the public image that we want to portray and sometimes even
trust with secrets. A single cross-site scripting vulnerability
allows attackers to do anything (that the victim may do) on behalf of
the victim. In this article we will look at how Facebook accounts could
be compromised through such a simple, yet effective vulnerability.
HTTP Only does not protect your site (or Facebook) from XSS exploitation
Linux Rootkit 2012
KBeast (Kernel Beast) 2012 is a Linux rootkit that hides the loadable kernel module, hides files and directories, hides processes, hides sockets and connections, performs keystroke logging, has anti-kill functionality and more.
How to tracks IPs in log files and executes shell commands per each IP?
Here is a PHP script that tracks IPs in log files and executes shell commands per each IP. It was created as a sort of reverse fail2ban or cheap VPN-firewall: a machine with a closed firewall can be told, by a foreign machine, to accept connections from a specific IP.
Subscribe to:
Posts (Atom)