Monday, August 22, 2011

What Are Input Validation Attacks

0 comments
Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application. The most common input validation attacks are as follows- 1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement...

Speaking LEET(1337) The Language Of HACKERS

0 comments
Leet, the language of the Geeks and Hackers. To speak leet, you more or less need to un-learn proper english. The history of leet goes back to the early days of online message boards, or forums, where users can post messages to carry on a threaded conversation. In an attempt to “Clean-Up” the...

OWASP Zed Attack Proxy (ZAP) v.1.3.2 Released

0 comments
The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration...

JonDoFox 2.5.3 - Browser Optimized for anonymous and secure web surfing

0 comments
The JonDoFox research team has uncovered a new attack on web browsers : Affected are the web browsers Firefox, Chrome and Safari. By a hidden call over of a URL with HTTP authentication data, third party sites could track a user over several web sites, even if the user blocks all cookies and other...

Sunday, August 21, 2011

The Hackers Underground Handbook Free Download

2 comments
Hey friends finally i have found out the most popular & costly book this is " The Hackers Underground Handbook" is free to download.... i hope that u all are need the book and waited so much... so keep hurry and download today now... DOWNLOAD...