Fiddler XSRF Inspector Released
May 31st, 2010 📆 | 3680 Views ⚑
Fiddler XSRF Inspector is a plugin for Fiddler 2 that extracts cross-site request forgery attacks from HTTP requests. Installation Copy
May 31st, 2010 📆 | 3680 Views ⚑
Fiddler XSRF Inspector is a plugin for Fiddler 2 that extracts cross-site request forgery attacks from HTTP requests. Installation Copy
May 30th, 2010 📆 | 4380 Views ⚑
Victor Beitner, a security expert who reconfigures photocopy machines destined for resale in Toronto, says businesses are completely unaware of
May 30th, 2010 📆 | 4453 Views ⚑
Identify content management systems (CMS), blogging platforms, stats/analytics packages, javascript libraries, servers and more. When you visit a website in
May 29th, 2010 📆 | 6304 Views ⚑
Phishing & XSS Attack on Dialog.lk at National Institute for Information Technology (NIIT) by Mohammed Afzal 2010-05-29 19:25:13 source
May 28th, 2010 📆 | 7698 Views ⚑
Introduction: In this paper, I want to represent a method for performing Cross Site URL Hijacking (which we can call
May 28th, 2010 📆 | 6285 Views ⚑
Visit OctaneReport.com for more stories and pics from the World Time Attack Challenge. Taking place just outside of Sydney, Australia,
May 24th, 2010 📆 | 7897 Views ⚑
John Edwin Mroz, President & CEO of the EastWest Institute, shares his commentary on security and the international community in
May 24th, 2010 📆 | 7259 Views ⚑
The amount of websites has increased rapidly during the last years. While websites consisted mostly of static HTML files in
May 21st, 2010 📆 | 4687 Views ⚑
When companies move to the cloud, they usually eliminate tech jobs. But they still need security specialists – with the
May 20th, 2010 📆 | 2301 Views ⚑
Showing how to change the settings in the Application Control to be 100% save from malware. video, sharing, camera phone,
May 18th, 2010 📆 | 8402 Views ⚑
Non-fiction narrative with action re-enactment sequences ala Spy Vs Spy. Explores the world of hackers; the good guys vs. the
May 18th, 2010 📆 | 2193 Views ⚑
John Edwin Mroz, President & CEO of the EastWest Institute, shares his commentary on security and the international community in
May 17th, 2010 📆 | 1576 Views ⚑
Web Browsers Leave ‘Fingerprints’ Behind as You Surf the Net Abstract. We investigate the degree to which modern web browsers
May 16th, 2010 📆 | 5502 Views ⚑
Lens ASP.NET Penetration Testing Tool Lens is an open-source ethical hacking tool specialized to penetration testing of ASP.NET web applications.
May 15th, 2010 📆 | 7811 Views ⚑
Como Ver TV Desde Tu PC Haz click aqui para ver tv en tu pc http://comovertvdesdetupc.blogspot.com/ http://tinyurl.com/TelevisionEnVivo Watch TV http://tinyurl.com/WatchLiveTVonYourPCNow
May 15th, 2010 📆 | 1884 Views ⚑
New Linux Distribution for Ethical Hacking and Penetration Testing Live Hacking CD is a new Linux distribution packed with tools
May 15th, 2010 📆 | 8385 Views ⚑
Music from the game Defcon by Introversion. $10 on steam, Get it now. 2010-05-15 09:23:11 source
May 14th, 2010 📆 | 3934 Views ⚑
recovering files using photorec and testdisk 2010-05-14 00:06:00 source
May 12th, 2010 📆 | 7936 Views ⚑
This paper sheds light on the modified approach to trigger web attacks through JavaScript protocol handler in the context of
May 12th, 2010 📆 | 3551 Views ⚑
In the year 2010 the offensive-security team organized a hack-challenge which was called “how strong is your fu” and the
Comments