From China, With Love
Lest anyone think that D-Link is the only vendor who puts backdoors in their products, here’s one that can be exploited with a single ...
Burp SessionAuth Extension
Overview Normally a web application should identify a logged in user by data which is stored on the server side in some kind of session ...
Android Hack-Tool Steals PC Info
Over the weekend, Yeh, one of our Security Response Analysts, came across some interesting analysis on a Chinese language forum about an ...
The most sophisticated Android Trojan
Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were en...
Cracking Credit Card Hashes with PowerShell
As penetration testers, we are frequently engaged to do penetration tests for PCI compliance. As a part of these penetration tests, w...
Stupid Little IPv6 Tricks
With the IPv6 Summit on Friday, various IPv6 related topics are of course on my mind. So I figured to put together a quick laundry list o...
Steps Toward Weaponizing the Android Platform
The mobile and tablet market have been flooded by millions upon millions of Android based devices. I wonder if Ken Thompson or Dennis Ritch...
Flexible Home Layout
Downloads[two]
Media[left]
Books[right]
Photos[carousel](6)
Accessories[combine]
Zebronics
Advertisements
Popular Posts
-
Anonymous What is Information security? Security means surety of not breaching personal information. It is also known as safegu...
-
XCODE Exploit: Vulnerable and Webshell Scanner.Once downloaded, extract all the files and run XCodeXploitScanner.exe, Dork Click It and a ...
-
Batch File programming refers to a batch file which are essentially sequences of DOS commands and are stored in a text file with an extens...
-
uCertify is a preparation kit software provider for IT certification exams. This perpkit is for those who are looking for Certified Eth...
-
WPScan is a black box WordPress Security Scanner written in Ruby which attempts to find known security weaknesses within WordPress insta...
-
Php5 And MySQL Bible Author : Tim Converse and Joyce Park with Clark Morgan Download Php6 And MySQL Bible Author : Authors: St...
-
Somedays back i got a request from my blog's reader about the WEP,WPA,WP2 or Wifi cracking Dictionary files. As all the people who ...
-
What is a VPN? A VPN (virtual private network) is an alternative to a truly private network, where someone completely owns the infrastruct...
-
The OWASP (Open Web Application Security Project) Top Ten is a list of the 10 most dangerous current Web application security flaws, along...
-
If you set up your PC to dual boot between Windows 7 and Windows 8, but have decided to end the experiment and go back to using Windows 7 ...
