Monday, 10. October 2011
WebBackdoors
This paper provides insight on common web back doors and how simple manipulations could make them undetectable by AV and other security suits. Paper explains few techniques that could be used to render undetectable and unnoticed backdoor inside web applications.
This paper is mainly an update for an old paper of ours Effectiveness of Antivirus in Detecting Web Application Backdoors, which mainly questioned the effectiveness of AV with respect to web shells and analysis of a couple of web shells. Current paper takes this topic further and explains a couple of methodologies that could be used to make stealth application layer backdoors using web scripting languages .This paper explains various Web Backdoor attacks and evasion techniques that could be used to stay undetected

Download PDF
http://www.garage4hackers.com/blogs/8/attachments/101d1318227327-webbackdoors-attack-evasion-detection-cocon_paper.pdf

Permalink

 


Saturday, 1. October 2011
Hacking Your Android
Download PDF
http://dl.packetstormsecurity.net/papers/general/Android.pdf

Permalink

 


Wednesday, 28. September 2011
Wpscan And Metasploit's Meterpreter

WPScan and Metasploit's Meterpreter from ethicalhack3r on Vimeo.

Permalink

 


Friday, 23. September 2011
BruCON Agnitio workshop
Required for the Agnitio hands on demos:

A 32bit Windows Operating System (XP or 7 preferably – VM will be fine)
.NET framework 3.5 installed
Agnitio v2.0 installed
http://sourceforge.net/projects/agnitiotool/
Download the Pandemobium Android and iOS source code
https://github.com/denimgroup/Pandemobium
Download the selected vulnerable open source application
https://github.com/denimgroup/Pandemobium

by David Rook (Security Ninja)

Permalink

 


Saturday, 3. September 2011
Cookies - Tell You Who You Are
With the success of Web applications, most of our data is now stored on various third-party servers where they are processed to deliver personalized services.

Download PDF
http://arxiv.org/PS_cache/arxiv/pdf/1108/1108.5864v1.pdf

by
Vincent Toubiana Vincent Verdot

Permalink

 


Friday, 2. September 2011
Step by Step guide for LFI (Local File Inclusion)
This tutorial will guide you into the process of exploiting a website thru the LFI (Local File Inclusion).

Source
http://pastebin.com/ssSAVmcR

by
Amarjit Singh

Permalink

 


Monday, 29. August 2011
Creating Binary Files on a Firewalled Server
This article introduces techniques that an attacker, who has already access to execute commands on a server, could use to create binary files on server which has no internet access (firewalled) or web filtering (antivirus).

Download PDF
http://www.surgeonix.com/blog/downloads/Creating_Binary_Files_on_a_Firewalled_Server.pdf

by
SuRGeoNix

Permalink

 


Saturday, 27. August 2011
OWASP Tutorial Series
Episode 1: Appsec Basics


Episode 2: SQL Injection


Episode 3: Cross Site Scripting (XSS)

Permalink

 


Friday, 26. August 2011
Dissecting Java Server Faces for Penetration Testing
This paper sheds light on the findings of security testing of Java
Server Faces. JSF has been widely used as an open source web framework
for developing efficient applications using J2EE. JSF is compared with
ASP.NET framework to unearth potential security flaws.

Download PDF
http://www.secniche.org/jsf/dissecting_jsf_pt_aks_kr.pdf

Permalink

 


Wednesday, 24. August 2011
Upload a php shell
uploading a shell



IPB Shell uploading

Permalink