Pen Testing
54 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Ali Raza from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

MyBB Ajaxfs 2 Plugin - SQL Injection Vulnerability

MyBB Ajaxfs 2 Plugin - SQL Injection Vulnerability | Pen Testing | Scoop.it

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Ali Raza from SecurityLearn
Scoop.it!

iOS hacking resource collection

A collection of iOS research presentations, videos and interesting papers- iOS Hacking: Title Year Author Download link Fuzzing the Phone in your Phone 2009 Charlie Miller & Collin Mulliner Pap...

Via satishb3
more...
No comment yet.
Rescooped by Ali Raza from SecurityLearn
Scoop.it!

Pentesting Web Applications

I use these slides for my training. Initially I thought of not sharing with anyone. Later I felt, even if someone use my slides, they cannot teach like me Slides:

Via satishb3
more...
No comment yet.
Rescooped by Ali Raza from SecurityLearn
Scoop.it!

Web Application Hacking Lab Setup

To learn & practice hacking we have to setup our lab environment because hacking real sites is a crime. Setting up a lab environment requires a lot of effort and time. To overcome all these pro...

Via satishb3
more...
No comment yet.
Rescooped by Ali Raza from Content Curation World
Scoop.it!

Journalistic Mindmap Helps Curate Context Around a Story: Mattermap

Journalistic Mindmap Helps Curate Context Around a Story: Mattermap | Pen Testing | Scoop.it




Via Robin Good
more...
David Sallinen (WAN-IFRA)'s comment, September 29, 2013 3:14 PM
Excellent ;-)
Javier Antonio Bellina's curator insight, April 26, 2014 11:20 AM

¡Mapas mentales en acción!

TeresaSiluar's curator insight, April 27, 2014 11:28 AM

Uso de mapas mentales en la curación de contenidos.

Rescooped by Ali Raza from Chinese Cyber Code Conflict
Scoop.it!

Defining the Qualities of Cyber Warfare

Defining the Qualities of Cyber Warfare | Pen Testing | Scoop.it
Defining the Qualities of Cyber Warfare
Cyber warfare is one of the hottest topics currently trending in newsfeeds and, although many are quick to use the term, not everyone fully understands the concept.

Via Red-DragonRising
more...
No comment yet.
Rescooped by Ali Raza from Chinese Cyber Code Conflict
Scoop.it!

The ‘real’ war game in the cyber space - CXOtoday.com

The ‘real’ war game in the cyber space - CXOtoday.com | Pen Testing | Scoop.it

Via Red-DragonRising
more...
No comment yet.
Rescooped by Ali Raza from Security News and Updates
Scoop.it!

Fake LinkedIn Invitation Notification Lead to Black Hole Exploit Kit ~ Technology Exposed

Fake LinkedIn Invitation Notification Lead to Black Hole Exploit Kit ~ Technology Exposed | Pen Testing | Scoop.it
A blog about Computer Security,Security News and Updates ,Security Tools ,Ethical Hacking and Tricks and Tips.

Via Jishnub
more...
No comment yet.
Rescooped by Ali Raza from SecurityLearn
Scoop.it!

Pentesting iPhone Applications

I have given a presentation on Pentesting iPhone Applications in c0c0n. This presentation mainly focuses on methodology, techniques and the tools that will help security testers while assessing the...

Via satishb3
more...
No comment yet.
Rescooped by Ali Raza from SecurityLearn
Scoop.it!

Web Application Hacking Lab Setup

To learn & practice hacking we have to setup our lab environment because hacking real sites is a crime. Setting up a lab environment requires a lot of effort and time. To overcome all these pro...

Via satishb3
more...
No comment yet.
Scooped by Ali Raza
Scoop.it!

A Chinese Hacker's Identity Unmasked

A Chinese Hacker's Identity Unmasked | Pen Testing | Scoop.it
Cloaked by malware, aliases, and misspellings, computer spies are usually invisible. This one made a mistake. A special investigation
more...
No comment yet.
Rescooped by Ali Raza from Linux,Ethical Hacking
Scoop.it!

Beware of new Shylock Malware Spreading Through Skype ~ Technology Exposed

Beware of new Shylock Malware Spreading Through Skype ~ Technology Exposed | Pen Testing | Scoop.it

Via Jishnub
more...
No comment yet.
Rescooped by Ali Raza from SecurityLearn
Scoop.it!

Decrypting the iPhone keychain from backups

In iTunes backup, the iPhone Keychain sqlite database is stored as a Plist file. The Keychain file gets stored with 51a4616e576dd33cd2abadfea874eb8ff246bf0e file name in the iTunes backup folder. K...

Via satishb3
more...
No comment yet.
Rescooped by Ali Raza from Security News and Updates
Scoop.it!

Facebook Hacked Using a Zero Day Java Exploit. ~ Technology Exposed

Facebook Hacked Using a Zero Day Java Exploit. ~ Technology Exposed | Pen Testing | Scoop.it
A blog about Computer Security,Security News and Updates ,Security Tools ,Ethical Hacking and Tricks and Tips.

Via Jishnub
more...
No comment yet.
Rescooped by Ali Raza from Security News and Updates
Scoop.it!

How to hack Linux by breaking the root password ~ Technology Exposed

How to hack Linux by breaking the root password ~ Technology Exposed | Pen Testing | Scoop.it
A blog about Computer Security,Security News and Updates ,Security Tools ,Ethical Hacking and Tricks and Tips.

Via Jishnub
more...
No comment yet.
Rescooped by Ali Raza from Chinese Cyber Code Conflict
Scoop.it!

National Intelligence Estimate: China Systematically Hacking U.S. Companies

National Intelligence Estimate: China Systematically Hacking U.S. Companies | Pen Testing | Scoop.it
The 2013 National Intelligence Estimate, released on Sunday, claims China is engaged in a massive, sustained cyber-espionage campaign against American businesses and institutions for economic gain.

Via Red-DragonRising
more...
No comment yet.
Rescooped by Ali Raza from Chinese Cyber Code Conflict
Scoop.it!

Welcome to the Malware-Industrial Complex | MIT Technology Review

Welcome to the Malware-Industrial Complex | MIT Technology Review | Pen Testing | Scoop.it
The U.S. government is developing new computer weapons and driving a black market in “zero-day” bugs. The result could be a more dangerous Web for everyone.

Via Red-DragonRising
more...
No comment yet.
Rescooped by Ali Raza from Chinese Cyber Code Conflict
Scoop.it!

Spain busts ‘ransomware’ cybercrime ring; 11 detained including gang’s alleged Russian leader

Spain busts ‘ransomware’ cybercrime ring; 11 detained including gang’s alleged Russian leader | Pen Testing | Scoop.it
MADRID — Spanish authorities on Wednesday announced the breakup of a cybercrime gang that used a “ransomware” virus to lock computers throughout Europe, display false messages claiming the action was taken by police and demand payment of €100...

Via Red-DragonRising
more...
No comment yet.
Rescooped by Ali Raza from Linux,Ethical Hacking
Scoop.it!

Surf Anonymously With The Best Free Online Privacy Tools ~ Technology Exposed

Surf Anonymously With The Best Free Online Privacy Tools ~ Technology Exposed | Pen Testing | Scoop.it
A blog about Computer Security,Security News and Updates ,Security Tools ,Ethical Hacking and Tricks and Tips.

Via Jishnub
more...
No comment yet.
Rescooped by Ali Raza from Linux,Ethical Hacking
Scoop.it!

Best Free Anonymous Web Proxy. ~ Technology Exposed

Best Free Anonymous Web Proxy. ~ Technology Exposed | Pen Testing | Scoop.it
A blog about Computer Security,Security News and Updates ,Security Tools ,Ethical Hacking and Tricks and Tips.

Via Jishnub
more...
No comment yet.
Rescooped by Ali Raza from Security News and Updates
Scoop.it!

Best Free Internet Security Suite For 2013 ~ Technology Exposed

Best Free Internet Security Suite For 2013 ~ Technology Exposed | Pen Testing | Scoop.it
A blog about Computer Security,Security News and Updates ,Security Tools ,Ethical Hacking and Tricks and Tips.

Via Jishnub
more...
No comment yet.