|
You are here |
chefsecure.com | ||
| | | | |
victoria.dev
|
|
| | | | | [AI summary] The article discusses SQL injection and cross-site scripting (XSS) vulnerabilities, emphasizing the importance of securing user input to prevent security breaches by white hat hackers. | |
| | | | |
m417z.com
|
|
| | | | | This is a story about Technion Confessions which begins with me being curious about the identity of the Technion Confessions admin, and ends up with me satisfying my curiosity by using an XSS vulnerability in the Technion course registration system and social engineering. | |
| | | | |
www.michalspacek.com
|
|
| | | | | Stealing session ids from phpinfo() output has been a known technique for some time, and is used to bypass the HttpOnly attribute, which prohibits JavaScript from accessing a cookie marked as such (e.g. PHPSESSID). Ijust now thought of a solution that allows you to keep your phpinfo(): we'll simply censor the sensitive data, making phpinfo() lose some of its value to the attacker. | |
| | | | |
blog.flanker017.me
|
|
| | | Testing Empire as post-exploitation framework in domain environment Due to recent research on Red-Blue Team Operations, I became interested in various post-exploitation framework. Since the widely ... | ||