Introducing Evil In Your Website With Untrusted Third Party Scripts Introducing Evil In Your Website With Untrusted Third Party Scripts

This is a small case study, where my aim is to explain why you shouldn't use untrusted third party scripts on your website. Htmlcommentb...

+ Read more »

Server Side Includes Vulnerability - SSI SCAN [TOOL] Server Side Includes Vulnerability - SSI SCAN [TOOL]

SSI-Scan is a basic PoC tool that helps facilitate the discovery of SSI injection vulnerabilities, a fairly rare and underdocumented code in...

+ Read more »

How I Hack Your Facebook By Stealing Your Cookies How I Hack Your Facebook By Stealing Your Cookies

We have already written several posts on hacking a facebook account  and the article that sparked the most of the reader's interest was...

+ Read more »

Kali Linux DOM Based XSS Writeup Kali Linux DOM Based XSS Writeup

Recently, I have been on a mission to find XSS in popular security training websites, Since these are the ones who care about their security...

+ Read more »

How Was 1337day.com Hacked? How Was 1337day.com Hacked?

Today, in the morning when i browsed to 1337day.com (The famous exploit buying/selling database), I was shocked to see 1337day defaced by f...

+ Read more »

List of Linux Key loggers List of Linux Key loggers

(1)LKL:- LKL is a user space keylogger that runs under linux--x86/arch. LKL sniffs and logs everything passes trought the hardware keyboard ...

+ Read more »

Anonymous Hackers Cause Significant Damage To Banking And Government Agencies Anonymous Hackers Cause Significant Damage To Banking And Government Agencies

A collective of hacker groups planed to attack the websites of major government agencies and banks on May 7 to protest American foreign poli...

+ Read more »

Exploit 0Day vulnerability in Internet Exploit 8 Exploit 0Day vulnerability in Internet Exploit 8

Microsoft Internet Explorer CGenericElement Object Use-After-Free Vulnerability This module exploits a vulnerability found in Microsoft Inte...

+ Read more »

SQL Injection With Update Query SQL Injection With Update Query

                              We have wrote couple of articles discussing various techniques and attack vectors for SQL Injection, We have ...

+ Read more »
 
Top