Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Main Page"
From NetSec
AlizaLorenzo (Talk | contribs) |
|||
(2 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
<center><table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td> | <center><table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td> | ||
<center><big>'''Articles'''</big> | <center><big>'''Articles'''</big> | ||
Line 31: | Line 4: | ||
---- | ---- | ||
''[[shellcode]] • [[countermeasures]] • [[administration]] • [[exploitation]] • [[programming]]'' | ''[[shellcode]] • [[countermeasures]] • [[administration]] • [[exploitation]] • [[programming]]'' | ||
+ | |||
Line 40: | Line 14: | ||
'''[[application|Software]] [[Exploitation]]''' | '''[[application|Software]] [[Exploitation]]''' | ||
− | [[Buffer overflow|Stack overflows]] • [[null-free shellcode]] • 32-bit [[ascii shellcode]] • 64-bit [[alphanumeric shellcode]] • [[unsafe string replacement]] | + | [[Buffer overflow|Stack overflows]] • [[Shellcode/Loaders|shellcode loaders]] • [[null-free shellcode]] • 32-bit [[ascii shellcode]] • 64-bit [[Shellcode/Alphanumeric|alphanumeric shellcode]] • [[unsafe string replacement]] • [[Shellcode/Self-modifying|Self-modifying shellcode]] • [[Shellcode/Dynamic|dynamic shellcode]] • [[Shellcode/Socket-reuse|socket reuse]] |
Latest revision as of 03:10, 4 June 2015
shellcode • countermeasures • administration • exploitation • programming
assembly • linux assembly • C • C++ Stack overflows • shellcode loaders • null-free shellcode • 32-bit ascii shellcode • 64-bit alphanumeric shellcode • unsafe string replacement • Self-modifying shellcode • dynamic shellcode • socket reuse Perl • Python • PHP • Ruby • LUA • The bash book • SQL Orientation • Examples of polymorphism SQL injection • XSS • Cookies • File inclusion • Command injection • CSRF • XSRF • XSCF • Coldfusion hacking • SQL Backdoors
|
Tools
| |||||
---|---|---|---|---|---|
Vanguard | web application vulnerability testing engine written in perl with LibWhisker2 support | Jynx2 | Version 2.0 of the classic LD_Preload userland rootkit written in C | ||
Bleeding Life | PHP and MySQL based browser buffer overflow exploit pack | Kolkata | Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis | ||
GScrape | Google scraper written in perl for rapidly identifying vulnerable websites and generating statistics | Lfi_autopwn.pl | Given a file inclusion vulnerability, this Perl script will spawn a shell | ||
Mysql5 enumerator | Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script | Social Network Redirection Utility | Rickroll your friends with content-forged image redirects |