MySQL Injection - Simple Load File and Into OutFile
Introduction
If you know (basic) MySQL Injection, you can read this tutorial...
Ok, let's see now what are Load File and Into OutFile.
-- What are Load File and Into OutFile?
That are syntaxes (used in MySQL Injections).
Load File: Reads the file...
Thursday, 24 November 2011
MySQL Injection - Simple Load File and Into OutFile
M.O.R.E >> "MySQL Injection - Simple Load File and Into OutFile"
Wednesday, 23 November 2011
Google Online Security Blog: Protecting data for the long term with forward secrecy

Google Online Security Blog: Protecting data for the long term with forward secrecyLast year we introduced HTTPS by default for Gmail and encrypted search. We’re pleased to see that other major communications...
Enumerating And Breaking VoIP
Source :packetstormsecurity
Whitepaper called Enumerating and Breaking VoIP. It discusses various enumeration techniques followed by a demonstration of a few VoIP attacks.tags | paperMD5 | 6f838df84fef711d5acd89d899314395Download : enumerating_breaking_voip.pdf...
w3af v.1.1 Released
w3af v.1.1 Released w3af v.1.1 Released Web Application Attack and Audit Framework W3af is an extremely popular, powerful, and flexible framework for finding and exploiting web application vulnerabilities. It is easy to use and extend and features dozens of web assessment and exploitation plugins...
PHP Vulnerability Hunter v.1.1.4.6

PHP Vulnerability Hunter v.1.1.4.6
PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool.
This is the application that detected almost all of the web application vulnerabilities...
Subscribe to:
Posts (Atom)