This post is summary from Source. If you want to see all details please go to the Source.
CMS Identification
BlindElephant
BlindElephant is a python based tool for fingerprinting the web
applications. This tool basically attempts to discover the version used
by comparing the static files at certain known locations against the
hashes which are pre-computed for the versions of those files
Showing posts with label w3af. Show all posts
Showing posts with label w3af. Show all posts
Monday, 19 December 2011
Web Analysis, Vulnerability Assessment and Exploitation using Backtrack5
Labels:
backdoor,
backtrack,
Crack,
exploitation,
Hacking,
howto,
Information Security,
metasploit,
Network Security,
pentest,
security,
shell,
Source,
sql_injection,
tool,
trick,
w3af,
Web,
Web Application
Thursday, 28 April 2011
AntiXSS 4.1 Beta 1
As this is only a beta there are no binaries, you will need to grab the source yourself and compile.
Replacing the default encoders in .NET 4.0 will require you to use the DLL from the Net4 project and to make a web.config change to the httpRuntime node as follows
The runtime encoder
Replacing the default encoders in .NET 4.0 will require you to use the DLL from the Net4 project and to make a web.config change to the httpRuntime node as follows
The runtime encoder
Labels:
Defensive,
fix,
Information Security,
security,
Vulnerability,
w3af,
Web,
Web Application,
Web Application Attack
Wednesday, 6 April 2011
HACKXOR [webapp hacking game]
About hacxkor Hackxor is a webapp hacking game where players must locate and exploit vulnerabilities to progress through the story. Think WebGoat but with a plot and a focus on realism&difficulty. Contains XSS, CSRF, SQLi, ReDoS, DOR, command injection, etc
Features: Client attack simulation using HtmlUnit; no alert('xss') here.
Smooth difficulty gradient from moderately easy to
Features: Client attack simulation using HtmlUnit; no alert('xss') here.
Smooth difficulty gradient from moderately easy to
Labels:
exploitation,
Hacking,
Information Leak,
Information Security,
security,
tool,
Vulnerability,
w3af,
Web,
Web Application,
Web Application Attack
Subscribe to:
Posts (Atom)