Secure Your E-Mail Account

Secure Your E-Mail Account   How To Secure Your E-Mail Account ? E-mail is one of the most widely used Internet services today. The services which are generally used in the e-mail Infrastructure are Simple Mail Transfer Protocol (SMTP) and Post Office Protocol version 3 (POP3) or Internet Message Access Protocol Read more…

Loading

Adobe Flash – Out-of-Bounds Read in Getting TextField Width Exploit (0DAY)

Author Google Security Research Risk [ Security Risk Medium ] 0day-ID 0day-ID-27796 Category dos / poc Date add 17-05-2017 CVE CVE-2017-3064 Platform multiple Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1211 The attached swf causes an out-of-bounds read in getting the width of a TextField. Proof of Concept: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42019.zip Source

Loading

DDoS

How Hackers DDoS What is it? A “denial of service” (sometimes called a “distributed denial of service” or DDoS) attack occurs when a system, in this case a web server, receives so many requests at one time that the server resources are overloaded the system simply locks up and shuts Read more…

Loading

Tools Category

Commix v1.9 release

Automated All-in-One OS command injection and exploitation tool   Commix (short for [comm]and [i]njection e[x]ploiter) is an automated tool written by Anastasios Stasinopoulos (@ancst) that can be used from web developers, penetration testers or even security researchers in order to test web-based applications with the view to find bugs, errors Read more…

Loading