Today I Am Going To Introduce You To The Main Common Code Injection Cross Site Scripting So Let's Have Some Talks About XSS Stands For Cross Site Scripting It's The Main Code Injection Through Which An Attacker Can Gain Unauthorized Access To System With Few JavaScript Injections :) And That Allows An Attacker To Send Client Side Scripts To The Server Viewed By Another Person In Case Of Simple Understanding
The Attacker Just Sends JavaScript...
Monday, May 28, 2012
Sunday, May 27, 2012
9:25 AM
SL4ID3R
No comments
Burp Sequencer
The Burp Sequencer tool
is used to check for the extent of randomness in the session tokens
generated by the Web application. Brute force attacks enumerate every
possible combination for gaining authentication from the Web
application. Thus it is important to have a high degree of randomness in
the session token IDs. For this Burp Suite training...
9:24 AM
SL4ID3R
No comments
First, what is “syskey”?
SYSKEY is a utility that encrypts the hashed
password information in a SAM database in a Windows system using a
128-bit encryption key.
SYSKEY was an optional feature added in Windows NT 4.0 SP3. It was
meant to protect against offline password cracking attacks so that the...
9:22 AM
SL4ID3R
2 comments
Guys you must be knowing how to break the
password of Windows by using some Live OS. But using Live OS is bit
complicated and sometimes they take a lot of time to crack a password.
So in this tutorial you will see how to bypass Windows OS so that you
will not indulge in complicated situation and can save your time.
At first we need a software called Kon-Boot
and we...
9:18 AM
SL4ID3R
2 comments

Do you
aware that enabling IP forwarding using Windows XP Professional will
make it as a simple router, so that you can have 2-3 different networks
at home and those computers manage to talk to each other from different
network. The router is needed to send/receive the traffic from one
network to another network or access Internet. The benefit is you don’t
have...
Saturday, May 12, 2012
6:42 PM
SL4ID3R
3 comments
1 – IntroductionIn this tutorial I show you how to get a shell on websites using Local File Inclusion vulnerabilities andinjection malicious code in proc/self/environ.Is a step by step tutorial.2 – Finding LFI- Now we are going to find a Local File Inclusion vulnerable website.So we found our target,lets check it.
www.website.com/view.php?page=contact.php
- Now lets replace contact.php with ../ so the URL will become
www.website.com/view.php?page=../
and...
Subscribe to:
Posts (Atom)