menu

Thursday, 24 November 2011

MySQL Injection - Simple Load File and Into OutFile

MySQL Injection - Simple Load File and Into OutFile Introduction If you know (basic) MySQL Injection, you can read this tutorial... Ok, let's see now what are Load File and Into OutFile. -- What are Load File and Into OutFile? That are syntaxes (used in MySQL Injections). Load File: Reads the file...
M.O.R.E >> "MySQL Injection - Simple Load File and Into OutFile"

Wednesday, 23 November 2011

Google Online Security Blog: Protecting data for the long term with forward secrecy

Google Online Security Blog: Protecting data for the long term with forward secrecyLast year we introduced HTTPS by default for Gmail and encrypted search. We’re pleased to see that other major communications...
M.O.R.E >> "Google Online Security Blog: Protecting data for the long term with forward secrecy"

Enumerating And Breaking VoIP

 Source :packetstormsecurity Whitepaper called Enumerating and Breaking VoIP. It discusses various enumeration techniques followed by a demonstration of a few VoIP attacks.tags | paperMD5 | 6f838df84fef711d5acd89d899314395Download : enumerating_breaking_voip.pdf...
M.O.R.E >> "Enumerating And Breaking VoIP"

w3af v.1.1 Released

w3af v.1.1 Released w3af v.1.1 Released Web Application Attack and Audit Framework W3af is an extremely popular, powerful, and flexible framework for finding and exploiting web application vulnerabilities. It is easy to use and extend and features dozens of web assessment and exploitation plugins...
M.O.R.E >> "w3af v.1.1 Released"

PHP Vulnerability Hunter v.1.1.4.6

PHP Vulnerability Hunter v.1.1.4.6 PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool. This is the application that detected almost all of the web application vulnerabilities...
M.O.R.E >> "PHP Vulnerability Hunter v.1.1.4.6"