«
Expand/Collapse
43 items tagged "creation"
Related tags:
sql [+],
file [+],
vulnerability [+],
sql injection [+],
contests [+],
redbull [+],
injection [+],
x versions [+],
windows management instrumentation [+],
webkit [+],
vulnerability note [+],
tomatocart [+],
pfsense [+],
instrumentation service [+],
hacks [+],
cms [+],
certificate creation [+],
certificate [+],
apple safari [+],
temporary file [+],
red bull [+],
module [+],
hackaday [+],
config [+],
cnc [+],
3d printer [+],
zen gardening [+],
zen garden [+],
zen [+],
wheel [+],
university of warwick [+],
springfield missouri [+],
ruby [+],
round [+],
rickrolled [+],
reprap [+],
remote [+],
red [+],
pureedit [+],
product advertisement [+],
printer [+],
power [+],
popular vote [+],
plastic [+],
minotaur [+],
material models [+],
maryland [+],
mark [+],
luminous paper [+],
local [+],
led manufacturers [+],
laser [+],
kansas city [+],
institution [+],
gkn aerospace [+],
full time [+],
evoluciel [+],
enterprise portal [+],
enterprise [+],
doorstep [+],
display [+],
cve [+],
contest results [+],
contest [+],
cons [+],
conductive [+],
code execution [+],
clock [+],
bull [+],
bristol [+],
benefit of the doubt [+],
baltimore [+],
audio [+],
account creation [+],
account [+],
creation vulnerability [+],
private connection [+],
nightwing [+],
need [+],
minimal human intervention [+],
hardware requirements [+],
b.a.t.m.a.n [+]
-
-
3:11
»
Packet Storm Security Exploits
A1 Creation suffers from a remote SQL injection vulnerability that allows for administrative bypass. Note that this finding houses site-specific data.
-
-
4:00
»
Hack a Day
The 3D printer world has the creation of plastic trinkets pretty much down pat. The next step, obviously, is the creation of multi-material models, whether they be made of two different colors of plastic, or completely different materials entirely. A few folks from the University of Warwick and GKN Aerospace in Bristol, UK have come up with [...]
-
-
9:17
»
Hack a Day
Here’s one of the best takes on a glowing display that we’ve ever seen. Currently [H] is using his creation as a fuzzy clock, but it is certainly capable of displaying just about any messages. The project uses a wheel of luminous paper as the display surface. This has a glow-in-the-dark quality to it which [...]
-
-
11:01
»
Hack a Day
The people have spoken. Hackaday has won the Redbull creation challenge by popular vote. Despite a few bumpy spots in the voting process, our project, the Minotaur’s Revenge (gameplay footage around the 2min mark in the video), got the most votes from the public winning us $5000 for our hackerspace and a trip to the World [...]
-
-
12:01
»
Hack a Day
We are quite happy to announce that we’ve made it into the next round of the Red Bull Creation contest. Our entry was fairly simple, but just amusing enough to get us by. I’m assembling my team here in springfield missouri at Squidfoo as well as setting up some full time Skype sessions with writers [...]
-
-
8:01
»
Hack a Day
The Harford Hackerspace in Baltimore, Maryland just went public with the zen garden they built for the Red Bull Creation contest. It’s a CNC creation that will help ease your frustration with that DIY 3d printer that you just can’t seem to get calibrated correctly. On the hardware side the base of the machine serves [...]
-
-
16:33
»
Hack a Day
As you’ve already seen, we’ve been invited to participate in the Redbull creation contest. While we were deep into our work today, hacking things apart and soldering things together while trying not to blow ourselves up, we received a second package! It had a hand written note explaining that this was the last of its [...]
-
-
8:01
»
Hack a Day
When I returned from MakerFaire Kansas City I was very pleased to find a Bullduino waiting on my doorstep! Hackaday has been accepted into the first round of the Redbull Creation Contest. I’m doing the physical building while the other writers are consulting for this round. I’m also pulling people from around me here at [...]
-
-
10:01
»
Hack a Day
We get bombarded with press releases daily. Our inbox overflows with brand new iPhone cases and cheap LED manufacturers in china. We generally have no interest in sharing obvious product advertisement with you. However, some people understand what we’re interested in. Redbull gets it. They’re embracing hackers and running contests that promote DIY/hacking. Last year, [...]
-
-
7:10
»
Packet Storm Security Exploits
This Metasploit module exploits a file creation vulnerability in the Webkit rendering engine. It is possible to redirect the output of a XSLT transformation to an arbitrary file. The content of the created file must be ASCII or UTF-8. The destination path can be relative or absolute. This Metasploit module has been tested on Safari and Maxthon. Code execution can be achieved by first uploading the payload to the remote machine in VBS format, and then upload a MOF file, which enables Windows Management Instrumentation service to execute the VBS.
-
7:10
»
Packet Storm Security Recent Files
This Metasploit module exploits a file creation vulnerability in the Webkit rendering engine. It is possible to redirect the output of a XSLT transformation to an arbitrary file. The content of the created file must be ASCII or UTF-8. The destination path can be relative or absolute. This Metasploit module has been tested on Safari and Maxthon. Code execution can be achieved by first uploading the payload to the remote machine in VBS format, and then upload a MOF file, which enables Windows Management Instrumentation service to execute the VBS.
-
7:10
»
Packet Storm Security Misc. Files
This Metasploit module exploits a file creation vulnerability in the Webkit rendering engine. It is possible to redirect the output of a XSLT transformation to an arbitrary file. The content of the created file must be ASCII or UTF-8. The destination path can be relative or absolute. This Metasploit module has been tested on Safari and Maxthon. Code execution can be achieved by first uploading the payload to the remote machine in VBS format, and then upload a MOF file, which enables Windows Management Instrumentation service to execute the VBS.
-
-
22:43
»
Packet Storm Security Recent Files
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.
-
22:43
»
Packet Storm Security Tools
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.
-
22:43
»
Packet Storm Security Tools
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.
-
22:43
»
Packet Storm Security Misc. Files
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.
-
-
11:01
»
Hack a Day
[Mark] wrote in to share a little creation that he is calling the first solar-powered 3D printer in existence. While we can’t say that we totally agree with him on that title, we will give him the benefit of the doubt that this is the first solar-powered RepRap we have seen thus far. You might [...]
-
-
11:01
»
Hack a Day
72 hours of hacking came to a head with the completion of the Red Bull Creation. This years challenge was to build something out of junk that moves a human. It’s hard to pull all the aspects of the event together in one place, so here’s some links you’ll want to check out if you [...]
-
-
17:00
»
Packet Storm Security Recent Files
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.
-
17:00
»
Packet Storm Security Tools
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.
-
17:00
»
Packet Storm Security Misc. Files
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.
-
-
18:30
»
Packet Storm Security Recent Files
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.
-
18:30
»
Packet Storm Security Tools
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.
-
18:30
»
Packet Storm Security Misc. Files
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.