Monthly Archive: August 2016
+
Hi all! Today, I will show you how to configure Mobile Security Framework(MobSF). Mobsf is a dynamic analysis tool in analysis malware on mobile. Mobile Security …
By Cloudi
August 30, 2016
+
Overview CSRF is an attack technique that trapped victim load a web page contain malicious requests. Then if user currently authenticated, an CSRF attack behalf they …
+
Now, you guys have found unusual things on their website. These findings cover for website application testing like: SQL injection (SQLi), Cross Site scripting (XSS), cross-site request forgery (CSRF), …
By Stephen Stinson
August 26, 2016
+
About tutorial Table of contents Introduction to metasploit Architecture, enviroment and installation References 1. Introduction to metasploit The Metasploit Framework (MSF) is an open-source tool, which …
By Win Stark
August 25, 2016
+
Today, I will introduce to readers the basic steps to analyze a sample of malware on mobile. Here are the steps models analyzed my samples of …
By Cloudi
August 23, 2016
+
The addslashes(string) function returns a string with backslashes in front of predefined characters: single quote (‘) double quote (“) backslash (\) NULL This function can …
+
After the previous post, we do know how to use network scanners and use Peeping Tom to take the screenshot of all HTTP(s) services. Now, we …
By Stephen Stinson
August 19, 2016
+
INTRODUCTION Injection flaws occur when untrusted data is sent to an interpreter as part a command or query. The attacker’s hostile data can trick the interpreter …
By Win Stark
August 18, 2016