Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Main Page"

From NetSec
Jump to: navigation, search
 
(18 intermediate revisions by 4 users not shown)
Line 1: Line 1:
{{info|<center>More tools and articles coming in '''June'''.  Until then, you can get involved by joining [[IRC]] or subscribing to [http://www.reddit.com/r/blackhat /r/blackhat].</center>}}
+
<center><table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td>
 +
<center><big>'''Articles'''</big>
  
 +
----
 +
''[[shellcode]] &bull; [[countermeasures]] &bull; [[administration]] &bull; [[exploitation]] &bull; [[programming]]''
  
{{social}}
 
  
<table width="100%">
 
<tr style="vertical-align:top">
 
<td width="50%">
 
<table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td>
 
  
<big><big><center>'''Featured Article'''</center></big></big>
+
'''[[Compiled language]]s'''
  
----
+
[[assembly]] &bull; [[linux assembly]] &bull; [[C]] &bull; [[CPP|C++]]
  
{{:Main Page/Featured Article}}</td></tr></table>
 
</td>
 
<td width="50%">
 
<table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td>
 
  
<big><big><center>'''Featured Tool'''</center></big></big>
+
'''[[application|Software]] [[Exploitation]]'''
  
----
+
[[Buffer overflow|Stack overflows]] &bull; [[Shellcode/Loaders|shellcode loaders]] &bull; [[null-free shellcode]] &bull; 32-bit [[ascii shellcode]] &bull; 64-bit [[Shellcode/Alphanumeric|alphanumeric shellcode]] &bull; [[unsafe string replacement]] &bull; [[Shellcode/Self-modifying|Self-modifying shellcode]] &bull; [[Shellcode/Dynamic|dynamic shellcode]] &bull; [[Shellcode/Socket-reuse|socket reuse]]
  
{{:Main Page/Featured Tool}}</td></tr></table>
 
</td>
 
</tr>
 
</table>
 
  
 +
'''[[Interpreted languages]]'''
  
<center><table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td>
+
[[Perl]] &bull; [[Python]] &bull; [[PHP]] &bull; [[Ruby]] &bull; [[LUA]] &bull; [[Bash book|The bash book]] &bull; [[SQL Orientation]] &bull; [[Polymorphic|Examples of polymorphism]]
<center><big>'''Articles'''</big>
+
  
----
 
  
'''Exploitation:'''
+
'''[[Web Exploitation]]'''
  
[[Buffer overflow|Stack overflows]] &bull; [[SQL injection]] &bull; [[XSS]] &bull; [[Cookies]] &bull; [[File inclusion]] &bull; [[Command Injection|Command injection]] &bull; [[XSCF]] &bull; [[Cold Fusion Hacking|Coldfusion hacking]] &bull; [[Web Exploitation|Web exploitation]]
+
[[SQL injection]] &bull; [[XSS]] &bull; [[Cookies]] &bull; [[File inclusion]] &bull; [[Command Injection|Command injection]] &bull; [[CSRF]] &bull; [[XSRF]] &bull; [[XSCF]] &bull; [[Cold Fusion Hacking|Coldfusion hacking]] &bull; [[SQL Backdoors]]
  
'''Programming:'''
 
  
[[Ascii shellcode]] &bull; [[C]] &bull; [[CPP|C++]] &bull; [[Perl]] &bull; [[Python]] &bull; [[LUA]] &bull; [[Polymorphic]] &bull; [[Bash book|The bash book]] &bull; [[SQL Backdoors]]
+
<small>([[:Category:Indexing|The Index]]) ([[:Category:Requested_maintenance|Contribute]])</small></center></td></tr></table></center>
 
+
<small>([[Special:AllPages|All Pages]])</small></center></td></tr></table></center>
+
  
  
Line 47: Line 33:
 
{|style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"
 
{|style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"
 
!colspan="6" align="center"|<big>'''Tools</big>
 
!colspan="6" align="center"|<big>'''Tools</big>
 +
----
 
|-
 
|-
 
|valign="top"|'''[[Vanguard]]'''
 
|valign="top"|'''[[Vanguard]]'''
Line 61: Line 48:
 
|-
 
|-
 
|valign="top"|'''[[GScrape]]'''
 
|valign="top"|'''[[GScrape]]'''
|valign="top"|''Google scraper written [[perl]] for rapidly identifying vulnerable websites and generating statistics''
+
|valign="top"|''Google scraper written in [[perl]] for rapidly identifying vulnerable websites and generating statistics''
 
|
 
|
 
|valign="top"|'''[[Lfi_autopwn.pl]]'''
 
|valign="top"|'''[[Lfi_autopwn.pl]]'''

Latest revision as of 03:10, 4 June 2015

Articles

shellcodecountermeasuresadministrationexploitationprogramming


Compiled languages

assemblylinux assemblyCC++


Software Exploitation

Stack overflowsshellcode loadersnull-free shellcode • 32-bit ascii shellcode • 64-bit alphanumeric shellcodeunsafe string replacementSelf-modifying shellcodedynamic shellcodesocket reuse


Interpreted languages

PerlPythonPHPRubyLUAThe bash bookSQL OrientationExamples of polymorphism


Web Exploitation

SQL injectionXSSCookiesFile inclusionCommand injectionCSRFXSRFXSCFColdfusion hackingSQL Backdoors


(The Index) (Contribute)


Tools
Vanguard web application vulnerability testing engine written in perl with LibWhisker2 support Jynx2 Version 2.0 of the classic LD_Preload userland rootkit written in C
Bleeding Life PHP and MySQL based browser buffer overflow exploit pack Kolkata Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis
GScrape Google scraper written in perl for rapidly identifying vulnerable websites and generating statistics Lfi_autopwn.pl Given a file inclusion vulnerability, this Perl script will spawn a shell
Mysql5 enumerator Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script Social Network Redirection Utility Rickroll your friends with content-forged image redirects