Payload
http://www.persystems.net/sosvirus/pregunta/payload.htm
Cross Site Request Forgery(CSRF)
http://es.wikipedia.org/wiki/Cross_Site_Request_Forgery
XSS
http://es.wikipedia.org/wiki/XSS
Otras referencias
============================================================
http://www.exploit-db.com/exploits/12051
http://blackploit.blogspot.com/2010/05/buffer-overflow-en-php-6-dev.html
http://www.dragonjar.org/buffer-overflow-en-php-6-dev.xhtml
Revisar
===================
http://blackploit.blogspot.com/2010/05/csrftester-10-creando-poc-csrf.html
http://foro.elhacker.net/bugs_y_exploits/shellcode_compressor-t287699.0.html;wap2=
http://www.milw0rm.com/
Tuesday, May 25, 2010
Subscribe to:
Post Comments (Atom)
-
Resources: [1] Hela https://ome.grc.nia.nih.gov/iicbu2008/hela/index.html
-
en inglés se llama “A potentially dangerous Request.Form value was detected from the client”. varias páginas indican dos cosas: 1. agrega...
-
mas plugins http://devsnippets.com/reviews/using-jquery-to-style-design-elements-20-impressive-plugins.html http://www.extjs.com/deploy/dev/...
PostgreSQL json fields
select name->'es_PE',* from product_template where name->>'es_PE' like '%MEGACI%' References: [1] https:/...
No comments:
Post a Comment