I was browsing a few videos from the securitytube.net when i came across these nice and neat videos that describe how sql injection really work . i would recommend you all to definitely have a look at it . These… Continue Reading
I’ve seen many people becoming Victims of Viruses and Malware . People loosing their precious data because of negligence of not installing security softwares . I would like to give the credits to Aman for such a nice Mind map… Continue Reading
After a talk with a friend Aman Hardikar . He has allowed me to share his work and i am pleased to share it with you all . He has created many mind maps , web application , wireless audits… Continue Reading
Overview Over time now i’ve been reading articles of different encryption mechanisms SSL/TLS etc. I am going to cut short the chase since there are many articles available online to make u understand the basics . I was browsing over… Continue Reading
This module exploits a stack-based buffer overflow vulnerability in the latest version 3.5 of TugZip archiving utility. In order to trigger the vulnerability, an attacker must convince someone to load a specially crafted zip file with TugZip by double click… Continue Reading
This module embeds a Metasploit payload into an existing PDF file. The resulting PDF can be sent to a target as part of a social engineering attack.
This module exploits a memory corruption vulnerability within Microsoft’s HTML engine (mshtml). When parsing an HTML page containing a recursive CSS import, a C++ object is deleted and later reused. This leads to arbitrary code execution. This exploit utilizes a… Continue Reading
This module exploits a vulnerability found in Excel of Microsoft Office 2007. By supplying a malformed .xlb file, an attacker can control the content (source) of a memcpy routine, and the number of bytes to copy, therefore causing a stack-… Continue Reading