LDAP & XPATH
Am Wednesday, 17. Aug 2011 im Topic 'Pentest'
Blind LDAP Injection Exploitation Tool
Sample application showing practical approach how to exploit Blind LDAP Injection flaw. The tool is intended to be used by IT security researchers and pentesters for educational purposes only.
Download:
http://code.google.com/p/ldap-blind-explorer/downloads/list
Blind XPath Injection Exploitation Tool
Sample application showing practical approach how to exploit Blind XPath Injection flaw. The tool is intended to be used by IT security researchers and pentesters for educational purposes only.
Download:
http://code.google.com/p/xpath-blind-explorer/downloads/list
Sample application showing practical approach how to exploit Blind LDAP Injection flaw. The tool is intended to be used by IT security researchers and pentesters for educational purposes only.
Download:
http://code.google.com/p/ldap-blind-explorer/downloads/list
Blind XPath Injection Exploitation Tool
Sample application showing practical approach how to exploit Blind XPath Injection flaw. The tool is intended to be used by IT security researchers and pentesters for educational purposes only.
Download:
http://code.google.com/p/xpath-blind-explorer/downloads/list