Detailed paper about LDAP and Blind LDAP injections
View or Download LDAP Injections and Blind LDAP injections paper
Saw this Guide about PHP local file inclusion vulnerability and related topics covered, it also cover exploitation techniques that might come in handy in tricky scenarios.
Download or view: Local File Inclusion Exploitation Guide
Reported a zeroday (0day) XSS vulnerability in cloudflare infrastructure, that is effecting all cloudflare based websites which are in millions.
Including cloudflare’s own.
I checked it on some other highprofile Cloudflare based websites and its working there as well.
Hackforums.net Biggest hacking forum
These books are for beginners who are interested in learning Linux.
This will Answer few questions
How to learn linux any guides? I want good books , not just guides? Hands on linux book? Where to start learning linux?
This paper explains HTTP Response Splitting and Web Cache Poisoning Attacks Methods. It also contain related topics like CRLF injection etc. Thoroughly explained.
View or Download: HTTP Response Splitting and Web Cache Poisoning Attacks Methods
Credits: Original Author
This is a Writeup for Microsoft Hall of fame that SecurityUndefined got for reporting XSS on MSN Arabia. Microsoft don’t have a formal Bug Bounty program for Web application bugs, however those security researchers who report Web Application bugs in Microsoft Web infrastructure gets mentioned in Microsoft hall of fame.
Http Parameter Pollution is used to Bypass Mitigation by Web applications, this is a general kind of vulnerability that can be used to all sort of web application vulnerability bypass, including SQL injection , Cross Site Scripting (XSS) , Cross site request forgery
This Whitepaper Explains various type of Web application Firewall Bypass methods for various kind of Vulnerabilities. like SQL injection , XSS, LFI etc. Whitepapers are boring in general but this one has rich content:
Download Link: Methods To Bypass Web Application Firewall (WAF) Whitepaper
Credits: Authors of whitepaper.
SQL injection is Most Commonly used Method used by Hackers nowadays. It is considered as Critical Vulnerability because of its impact, attacker can manipulate database. Get database information, even get remote code execution
This paper Explains Basic Error based SQL injection Exploitation and intro to Blind SQL injection. Worth a read.
- Evan on Cloudflare 0day Cross site Scripting (XSS) Vulnerability
- Haider Mahmood on SQL Injection Exploitation Whitepaper
- http://www.nvo.com/promedica/botoxsupplierswholesalersbuyonline on SQL Injection Exploitation Whitepaper
- ATIS 1: Interview With Haider Mahmood Qureishi A Security Researcher From SecurityUndefined | Awwal Technology on Security Services
- Haider Mahmood on Cloudflare 0day Cross site Scripting (XSS) Vulnerability
- LDAP Injections And Blind LDAP Injections Whitepaper
- PHP Local File Inclusion [LFI] Vulnerability Guide
- Cloudflare 0day Cross site Scripting (XSS) Vulnerability
- Basics of Linux Books For Beginners
- HTTP Response Splitting and Web Cache Poisoning Attack Methods
- Microsoft Hall Of Fame Writeup | XSS on MSN Arabia
- Bypass Web Security Filters Using HTTP Parameter Pollution
- Methods To Bypass Web Application Firewall (WAF) Whitepaper
- SQL Injection Exploitation Whitepaper
December 2013 M T W T F S S « Nov 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31