Explore >> Select a destination


You are here

www.evil.blog
| | www.sjoerdlangkemper.nl
9.9 parsecs away

Travel
| | This article describes how cross site request forgery works, how sites defend against it and how to bypass these defenses.
| | johnjhacking.com
10.8 parsecs away

Travel
| | Credits Vulnerability Discovery John Chris Mack Exploit Development Stephen Chavez Robert Willis Identification Default credentials were discovered on an iRZ Mobile Router login page. Utilizing root:root gave us access to the administrative functionality for the device. Having administrative access allows for various manipulation. Any setting that can be modified by an administrator was accessible, but the function that caught specific interest was the "Crontabs" feature in the services tab. Exploiting c...
| | www.matuzo.at
13.2 parsecs away

Travel
| | An introduction to Cross Site Scripting and XSS prevention.
| | www.thepollyproject.org
65.5 parsecs away

Travel
|