Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Main Page"
From NetSec
(→Featured Articles) |
|||
(43 intermediate revisions by 6 users not shown) | |||
Line 1: | Line 1: | ||
− | + | <center><table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td> | |
+ | <center><big>'''Articles'''</big> | ||
− | [ | + | ---- |
+ | ''[[shellcode]] • [[countermeasures]] • [[administration]] • [[exploitation]] • [[programming]]'' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | '''[[Compiled language]]s''' | |
− | + | ||
− | + | [[assembly]] • [[linux assembly]] • [[C]] • [[CPP|C++]] | |
+ | |||
+ | |||
+ | '''[[application|Software]] [[Exploitation]]''' | ||
+ | |||
+ | [[Buffer overflow|Stack overflows]] • [[Shellcode/Loaders|shellcode loaders]] • [[null-free shellcode]] • 32-bit [[ascii shellcode]] • 64-bit [[Shellcode/Alphanumeric|alphanumeric shellcode]] • [[unsafe string replacement]] • [[Shellcode/Self-modifying|Self-modifying shellcode]] • [[Shellcode/Dynamic|dynamic shellcode]] • [[Shellcode/Socket-reuse|socket reuse]] | ||
+ | |||
+ | |||
+ | '''[[Interpreted languages]]''' | ||
+ | |||
+ | [[Perl]] • [[Python]] • [[PHP]] • [[Ruby]] • [[LUA]] • [[Bash book|The bash book]] • [[SQL Orientation]] • [[Polymorphic|Examples of polymorphism]] | ||
+ | |||
+ | |||
+ | '''[[Web Exploitation]]''' | ||
+ | |||
+ | [[SQL injection]] • [[XSS]] • [[Cookies]] • [[File inclusion]] • [[Command Injection|Command injection]] • [[CSRF]] • [[XSRF]] • [[XSCF]] • [[Cold Fusion Hacking|Coldfusion hacking]] • [[SQL Backdoors]] | ||
+ | |||
+ | |||
+ | <small>([[:Category:Indexing|The Index]]) ([[:Category:Requested_maintenance|Contribute]])</small></center></td></tr></table></center> | ||
+ | |||
+ | |||
+ | |||
+ | {|style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;" | ||
+ | !colspan="6" align="center"|<big>'''Tools</big> | ||
+ | ---- | ||
+ | |- | ||
+ | |valign="top"|'''[[Vanguard]]''' | ||
+ | |valign="top"|''[[Web Exploitation|web application vulnerability]] testing engine written in [[perl]] with LibWhisker2 support'' | ||
+ | | | ||
+ | |valign="top"|'''[[Jynx2]]''' | ||
+ | |valign="top"|''Version 2.0 of the classic [[LD_Preload]] userland rootkit written in [[C]]'' | ||
+ | |- | ||
+ | |valign="top"|'''[[Bleeding Life]]''' | ||
+ | |valign="top"|''[[PHP]] and [[MySQL]] based browser [[buffer overflow]] exploit pack'' | ||
+ | | | ||
+ | |valign="top"|'''[[Kolkata]]''' | ||
+ | |valign="top"|''Configurable [[perl]] scanner that analyzes [[cryptography|checksums]] to perform fingerprinting on web applications with static file analysis'' | ||
+ | |- | ||
+ | |valign="top"|'''[[GScrape]]''' | ||
+ | |valign="top"|''Google scraper written in [[perl]] for rapidly identifying vulnerable websites and generating statistics'' | ||
+ | | | ||
+ | |valign="top"|'''[[Lfi_autopwn.pl]]''' | ||
+ | |valign="top"|''Given a [[File inclusion|file inclusion]] vulnerability, this [[Perl]] script will spawn a shell'' | ||
+ | |- | ||
+ | |valign="top"|'''[[MySql 5 Enumeration|Mysql5 enumerator]]''' | ||
+ | |valign="top"|''Automatically map contents or query a remote database given a URL vulnerable to [[SQL injection]] with this [[perl]] script'' | ||
+ | | | ||
+ | |valign="top"|'''[http://chokepoint.net/?id=5 Social Network Redirection Utility]''' | ||
+ | |valign="top"|''Rickroll your friends with [[XSCF|content-forged]] image redirects'' | ||
+ | |||
+ | |} |
Latest revision as of 03:10, 4 June 2015
shellcode • countermeasures • administration • exploitation • programming
assembly • linux assembly • C • C++ Stack overflows • shellcode loaders • null-free shellcode • 32-bit ascii shellcode • 64-bit alphanumeric shellcode • unsafe string replacement • Self-modifying shellcode • dynamic shellcode • socket reuse Perl • Python • PHP • Ruby • LUA • The bash book • SQL Orientation • Examples of polymorphism SQL injection • XSS • Cookies • File inclusion • Command injection • CSRF • XSRF • XSCF • Coldfusion hacking • SQL Backdoors
|
Tools
| |||||
---|---|---|---|---|---|
Vanguard | web application vulnerability testing engine written in perl with LibWhisker2 support | Jynx2 | Version 2.0 of the classic LD_Preload userland rootkit written in C | ||
Bleeding Life | PHP and MySQL based browser buffer overflow exploit pack | Kolkata | Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis | ||
GScrape | Google scraper written in perl for rapidly identifying vulnerable websites and generating statistics | Lfi_autopwn.pl | Given a file inclusion vulnerability, this Perl script will spawn a shell | ||
Mysql5 enumerator | Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script | Social Network Redirection Utility | Rickroll your friends with content-forged image redirects |