Tags » Exploit

Explaining the exploitation of explicit expletives

Do words have “bad apple” effects on other words by sound resemblance? Mmmmmaybe. If they do, one possible case is the subject of my latest article on… 13 more words

The Week

"Shocking" Android browser bug could be a "privacy disaster": here's how to fix it

Independent security researcher Rafay Baloch has written about a security bug in the Android Browser app that allows one website to steal data from another. 660 more words

Featured

Testing for SQL Injection with sqlmap

 1. Introduction

This article introduces sqlmap and shows how it can be used to detect and exploit SQL injection vulnerabilities.

2. SQL injection

This vulnerability allows the attacker to modify an SQL query. 602 more words

Raiders of the Lost ROM

Once upon a time, arcades were all the rage. You could head down to your local arcade with a pocket full of quarters and try many different games.  488 more words

Classic Hacks

The Art of Exploitation

I will cover the steps to hacking in this article. Most of the computers can be hacked by using automated tools. The newbie who uses such tools without an understanding will be doing so at great risk and is known as script kiddie in the hacker community. 548 more words

Art Of Exploitation

XSSAuditor bypass via “location.search”

As it has already been mentioned in a previous post, one of the most widely used instances in JavaScript is the Location Object which is used to determine the current URL. 310 more words

Chrome

XSSAuditor bypass via “location.href”

Nowadays, one of the most widely used instances in JavaScript is the Location Object which is used to determine the current URL.

The location object… 313 more words

Chrome