«
Expand/Collapse
146 items tagged "advanced"
Related tags:
slides [+],
image [+],
xss [+],
poll [+],
usa [+],
file [+],
cross site scripting [+],
sql injection [+],
oclhashcat [+],
mysql [+],
hash [+],
gpu [+],
dictionary [+],
crackers [+],
advanced forum [+],
vbulletin [+],
shah tags [+],
saumil shah [+],
php [+],
mybb [+],
http [+],
hosting [+],
forum signatures [+],
code execution [+],
assessment techniques [+],
vulnerability [+],
yabsoft [+],
wordpress [+],
transfer manager [+],
thompson mathew monroe tags [+],
script sql [+],
mathew [+],
management [+],
forgery [+],
fingerprinting [+],
electron [+],
custom [+],
changuondyu [+],
authors [+],
advanced statistics [+],
whitepaper [+],
webapps [+],
web suite [+],
video [+],
transfer [+],
text widget [+],
text [+],
shell [+],
remote shell [+],
python [+],
promotion [+],
player [+],
picture [+],
persistent [+],
paper [+],
page finder [+],
page [+],
mp3 player [+],
laurent butti [+],
k rate [+],
infusion [+],
heap [+],
hacks [+],
forum [+],
forensic [+],
file vault [+],
fields [+],
exploitation [+],
cryptography [+],
cross [+],
butti [+],
business web [+],
blogging software [+],
asia [+],
advanced power [+],
advanced management [+],
admin [+],
Forums [+],
windows [+],
web applications [+],
web [+],
tv platform [+],
stats [+],
safer use [+],
power [+],
poll script [+],
pdf [+],
paul haas [+],
overflow [+],
local buffer overflow [+],
local [+],
kinect [+],
internet [+],
intellectual property theft [+],
injection [+],
hat europe [+],
greg hoglund [+],
fuzzing [+],
frontal attacks [+],
format string attacks [+],
format [+],
file upload [+],
exploits [+],
europe [+],
direct access [+],
digital satellite tv [+],
digital [+],
customer confidence [+],
bugtraq [+],
buffer overflow [+],
buffer [+],
broadcast [+],
audio [+],
arabic [+],
advanced digital broadcast [+],
active x [+],
zdi [+],
yuji [+],
wma recorder [+],
wma [+],
windows nt security [+],
vulnerability assessment [+],
vulnerabilities [+],
vault [+],
validation [+],
ukai [+],
tour [+],
technical details [+],
tab napping [+],
system [+],
string [+],
stealth [+],
sql query [+],
shiva [+],
server authentication [+],
server [+],
security windows [+],
security vulnerability [+],
security tags [+],
security authors [+],
security [+],
sandeep dhull [+],
ryan parmeh [+],
ryan lloyd [+],
ruben [+],
rsa [+],
rodrigo rubira [+],
rodrigo [+],
robotics project [+],
robotic arm control [+],
robert baird [+],
return [+],
remote file include vulnerability [+],
recorder mp3 [+],
realplayer [+],
realnetworks [+],
proliant [+],
printed circuit board [+],
power web [+],
poc [+],
plus [+],
phone [+],
phishing [+],
permission system [+],
permission [+],
penetration [+],
peach [+],
pcb manufacturer [+],
payload [+],
oracle sql [+],
oracle [+],
ntfs [+],
neel mehta [+],
mybloggie [+],
mssqli [+],
mp3 [+],
mobile phone service [+],
mobile [+],
misc [+],
minnesota [+],
mike lynn robert baird [+],
microcontroller [+],
michael eddington [+],
mehta [+],
mccray [+],
manager v1 [+],
manager [+],
management version [+],
management server [+],
k security [+],
joseph mccray [+],
joe mccray [+],
jeff nathan tags [+],
jeff nathan [+],
izotope [+],
injection technique [+],
ids [+],
hp proliant [+],
hoax [+],
havij [+],
hack in the box [+],
guestbook [+],
fragfs [+],
forum statistics [+],
file management [+],
engineering [+],
encryption [+],
elf [+],
dubai [+],
drupal [+],
directory traversal vulnerability [+],
derek soeder [+],
denial of service [+],
daybiz [+],
david litchfield [+],
cyb [+],
contact [+],
compromised [+],
code [+],
client portal [+],
client [+],
circuits [+],
chaos communication congress [+],
cellphones [+],
carphones [+],
cad cam [+],
bypass [+],
brian caswell [+],
branco [+],
book [+],
blind [+],
avr microcontroller [+],
authentication [+],
attack [+],
assessment [+],
apple quicktime player [+],
apple quicktime [+],
advanced software engineering [+],
advanced oracle [+],
advanced mobile phone service [+],
advanced audio coding [+],
address [+],
acontact [+],
Software [+],
Programming [+],
ARM [+],
11b [+],
black hat [+],
txt [+],
sql [+],
jschool [+],
day [+]
-
-
21:43
»
Packet Storm Security Exploits
This Metasploit module exploits a remote file inclusion flaw in the WordPress blogging software plugin known as Advanced Custom Fields. The vulnerability allows for remote file inclusion and remote code execution via the export.php script. The Advanced Custom Fields plug-in versions 3.5.1 and below are vulnerable. This exploit only works when the php option allow_url_include is set to On (Default Off).
-
21:43
»
Packet Storm Security Recent Files
This Metasploit module exploits a remote file inclusion flaw in the WordPress blogging software plugin known as Advanced Custom Fields. The vulnerability allows for remote file inclusion and remote code execution via the export.php script. The Advanced Custom Fields plug-in versions 3.5.1 and below are vulnerable. This exploit only works when the php option allow_url_include is set to On (Default Off).
-
21:43
»
Packet Storm Security Misc. Files
This Metasploit module exploits a remote file inclusion flaw in the WordPress blogging software plugin known as Advanced Custom Fields. The vulnerability allows for remote file inclusion and remote code execution via the export.php script. The Advanced Custom Fields plug-in versions 3.5.1 and below are vulnerable. This exploit only works when the php option allow_url_include is set to On (Default Off).
-
-
16:00
»
SecuriTeam
VBulletin ChangUonDyU - Advanced Statistics is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
-
-
16:00
»
SecuriTeam
HP ProLiant SL Advanced Power Manager is prone to a Remote User Validation Failure vulnerability.
-
17:42
»
Packet Storm Security Misc. Files
Advanced Admin Page Finder searches a site for over 800 possible administrative interfaces. Written in Python.
-
-
20:28
»
Packet Storm Security Misc. Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. 32-bit version.
-
19:50
»
Packet Storm Security Misc. Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. 64-bit version.
-
-
19:09
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
15:45
»
Packet Storm Security Recent Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. Linux and Windows binaries are included.
-
15:45
»
Packet Storm Security Misc. Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. Linux and Windows binaries are included.
-
-
9:00
»
Packet Storm Security Recent Files
Nowadays, there is a renewed interest in server-side attacks for hackers. According to SANS, attacks against web applications constitute more than 60% of the total attack attempts observed on the Internet. Victims may be the website owners (e.g. intellectual property theft or loss of customer confidence), their clients (e.g. bank transfer fraud or identity theft) as well as any Internet user, since web application vulnerabilities are now widely exploited to convert trusted websites into malicious ones, thus serving client-side exploits contents to Internet users. This document addresses the major threats which face today's companies, from database exfiltration in DMZ to the Advanced Persistent Threats recently undergone in many international organizations.
-
9:00
»
Packet Storm Security Misc. Files
Nowadays, there is a renewed interest in server-side attacks for hackers. According to SANS, attacks against web applications constitute more than 60% of the total attack attempts observed on the Internet. Victims may be the website owners (e.g. intellectual property theft or loss of customer confidence), their clients (e.g. bank transfer fraud or identity theft) as well as any Internet user, since web application vulnerabilities are now widely exploited to convert trusted websites into malicious ones, thus serving client-side exploits contents to Internet users. This document addresses the major threats which face today's companies, from database exfiltration in DMZ to the Advanced Persistent Threats recently undergone in many international organizations.
-
-
5:06
»
Hack a Day
Although not a hack in itself, many of you may be interested in seeing how a printed circuit board is made in the manufacturing world. This tour of Advanced Circuits does a good job of explaining the process. The article explains how a PCB will go through a CAD/CAM review, drilling, deburring, and the various [...]
-
-
20:29
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Postgres Plus Advanced Server DBA Management Server.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
10:39
»
Hack a Day
[Ryan Lloyd], [Sandeep Dhull], and [Ruben D'Sa] wrote in to share a robotics project they have been keeping busy with lately. The three University of Minnesota students are using a Kinect sensor to remotely control a robotic arm, but it’s not as simple as it sounds. Using OpenNI alongside PrimeSense, the team started out by [...]
-
-
10:34
»
Hack a Day
Remember the early days of cellphones and carphones when they were super-bulky and all the rage? Those early handsets used analog technology for communications in a protocol called Advanced Mobile Phone Service (AMPS). As more customers flocked to wireless providers, networks were transitioned over to digital phones in order to save bandwidth. Some places still [...]
-
-
15:09
»
Packet Storm Security Recent Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. Linux and Windows binaries are included.
-
15:09
»
Packet Storm Security Misc. Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. Linux and Windows binaries are included.
-
-
21:11
»
SecDocs
Tags:
microcontroller Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: A lecture showing the result of one year of intense programming with the AVR microcontroller family, showing language tricks, showcasing devices like the at90usb* and the xmega families, and lots of entertaining war stories and grizzly technical details.