#m@n@n🕊️:
Sql Injection Attack
Hibernate Query Language Injection
Direct OS Code Injection
XML Entity Injection
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Insecure Direct Object References
Security Misconfiguration
Sensitive Data Exposure
Missing Function Level Access Control
Cross-Site Request Forgery (CSRF)
Using Components with Known Vulnerabilities
Unvalidated Redirects and Forwards
Cross Site Scripting Attacks
Clickjacking Attacks
DNS Cache Poisoning
Symlinking \96 An Insider Attack
Cross Site Request Forgery Attacks
Remote Code Execution Attacks
Remote File inclusion
local file inclusion
Evercookie
Denial of Service Attack
Hacking Auto-Complete (Safari v1, Safari v2 TabHack, Firefox, Internet Explorer)
Cookie Eviction
Converting unimplementable Cookie-based XSS to a persistent attack
phpwn: Attack on PHP sessions and random numbers
NAT Pinning: Penetrating routers and firewalls from a web page (forcing router to port forward)
Mapping a web browser to GPS coordinates via router XSS + Google Location Services without prompting the user
XSHM Mark 2
MitM DNS Rebinding SSL/TLS Wildcards and XSS
Using Cookies For Selective DoS and State Detection
Quick Proxy Detection
Flash Camera and Mic Remember Function and XSS
Improving HTTPS Side Channel Attacks
Side Channel Attacks in SSL
Turning XSS into Clickjacking
Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution
CSS History Hack In Firefox Without JavaScript for Intranet Portscanning
Popup & Focus URL Hijacking
Hacking Facebook with HTML5
Stealing entire Auto-Complete data in Google Chrome
Chrome and Safari users open to stealth HTML5 AppCache attack
DNS Rebinding on Java Applets
Strokejacking
The curse of inverse strokejacking
Re-visiting JAVA De-serialization
Fooling B64_Encode(Payload) on WAFs and filters
MySQL Stacked Queries with SQL Injection...sort of
A Twitter DomXss, a wrong fix and something more
Get Internal Network Information with Java Applets
Java DSN Rebinding + Java Same IP Policy = The Internet Mayhem
Java Applet Same IP Host Access
SP.NET 'Padding Oracle' Crypto Attack
Posting raw XML cross-domain
Generic cross-browser cross-domain theft
One vector to rule them all
HTTP POST DoS
Penetrating Intranets through Adobe Flex Applications
No Alnum JavaScript (cheat sheet, jjencode demo)
Attacking HTTPS with Cache Injection
Tapjacking: owning smartphone browsers
Breaking into a WPA network with a webpage
XSS-Track: How to quietly track a whole website through single XSS
Next Generation Clickjacking
XSSing client-side dynamic HTML includes by hiding HTML inside images and more
Stroke triggered XSS and StrokeJacking
Internal Port Scanning via Crystal Reports
Lost in Translation (ASP\92s HomoXSSuality)
Cross Site URL Hijacking by using Error Object in Mozilla Firefox
JavaSnoop
IIS5.1 Directory Authentication Bypass by using ":$I30:$Index_Allocation"
Universal XSS in IE8
padding oracle web attack (poet, Padbuster, demo)
IIS6/ASP & file upload for fun and profit
Google Chrome HTTP AUTH Dialog Spoofing through Realm Manipulation
NoScript Bypass - "Reflective XSS" through Union SQL Poisoning Trick
Persistent Cross Interface Attacks
Port Scanning with HTML5 and JS-Recon
Performing DDoS attacks with HTML5 Cross Origin Requests & WebWorkers
Cracking hashes in the JavaScript cloud with Ravan
Stored XSS Vulnerability @ Amazon
Poisoning proxy caches using Java/Flash/Web Sockets
How to Conceal XSS Injection in HTML5
Expanding the Attack Surface
Chronofeit Phishing
Non-Obvious (Crypto) Bugs by Example
SQLi filter evasion cheat sheet (MySQL)
Tabnabbing: A New Type of Phishing Attack
UI Redressing: Attacks and Countermeasures Revisited
Cookie Poisoning
Pwning via SSRF
Chrome addon hacking
Bruteforce of PHPSESSID
Blended Threats and JavaScript
Cross-Site Port Attacks
Permanent backdooring of HTML5 client-side application
CAPTCHA Re-Riding Attack
XSS: Gaining access to HttpOnly Cookie in 2012
Attacking OData: HTTP Verb Tunneling, Navigation
Properties for Additional Data Access, System Query Options ($select)
HTTP Parameter Pollution
URL Hijacking
Strokejacking
Generic cross-browser cross-domain theft
Next Generation Clickjacking
Nice article...
ReplyDeleteSAP MDG Add-On
Master Data Dictionary
Master Data Problems
Master Data Governance
SAP Master Data Governance
Data Cleansing Services
Master Data Management
Vendor Master Data Management
Material Master Data Management
Customer Master Data Management
Product Master Data Management
Service Master Data Management
Inventory Analysis
Nice post....
ReplyDeleteWe are providing the best master data services around the world....visit our website for more information....
data management services
master data management in sap
data cleansing tools
Master Data Governance
Data Cleansing Services
data classification tools
Master Data Management SolutionsVendor Master Data Management
Customer Master Data Management
Service Master Data Management
mdom
Nice post....
ReplyDeleteWe are providing the best master data services around the world....visit our website for more information....
Master Data in sap
Security & Compliance
Master Data Management
Inventory Analysis
SAP Master Data Governance
data management services
master data management in sap
data cleansing tools
Master Data Governance
Nice post...
ReplyDeleteWe are providing the best master data services around the world....visit our website for more information....
Master Data Governance
Data Cleansing Services
data classification tools
Master Data Management Solutions
data transformation service
Material Master Data Management
Master Data Dictionary
Master Data Problems
Vendor Master Data Management
Nice post...
ReplyDeleteWe are providing the best master data services around the world....visit our website for more information....
Master Data in sap
Security & Compliance
Master Data Management
Inventory Analysis
SAP Master Data Governance
data management services
master data management in sap
data cleansing tools
Master Data Governance