bookmarks  3

  •  

    Want to beat the hackers at their own game? * Learn how hackers find security vulnerabilities! * Learn how hackers exploit web applications! * Learn how to stop them! This codelab shows how web application vulnerabilities can be exploited and how to defend against these attacks. The best way to learn things is by doing, so you'll get a chance to do some real penetration testing, actually exploiting a real application. Specifically, you'll learn the following: * How an application can be attacked using common web security vulnerabilities, like cross-site scripting vulnerabilities (XSS) and cross-site request forgery (XSRF). * How to find, fix, and avoid these common vulnerabilities and other bugs that have a security impact, such as denial-of-service, information disclosure, or remote code execution. To get the most out of this lab, you should have some familiarity with how a web application works (e.g., general knowledge of HTML, templates, cookies, AJAX, etc.).
    14 years ago by @gresch
    (0)
     
     
  •  

    What can I do with Umit? With Umit, you have all the power provided by Nmap through its regular command line interface, and a lot more in a highly usable and portable Graphical Interface. Some of its main features include: * Easily create powerful Nmap commands and save them as profiles to use whenever you need it * Edit your Profiles using the Interface Editor * Create Profiles with the assistance of a Wizard * Group and order you scan results * Filter hosts list by services * Filter services list by hosts * Compare two scan results in one of our three compare modes: text diff, graphical comparison and HTML diff * Search scan results * Use Umit interface through the Web Here is a brief of new features : * Scan scheduler * Network Inventory * Radial Mapper for Nmap's traceroute * Interface Editor * We have others packages too: Packet Manipulator * UmitWeb * UmitBT * UMPA
    14 years ago by @gresch
    (0)
     
     
  •  

    Die scip VulDB ist eine freie Verwundbarkeitsdatenbank in deutscher Sprache. Unsere Experten dokumentieren täglich die neuesten Schwachstellen und stellen die Daten dieser zur Verfügung. Dadurch können sowohl unsere Penetration Tester als auch Kunden oder Partner von den katalogisierten Schwachstellen profitieren.
    15 years ago by @gresch
    (0)
     
     
  • ⟨⟨
  • 1
  • ⟩⟩

publications  

    No matching posts.
  • ⟨⟨
  • ⟩⟩