Advanced Threats,Intelligence Technology,CyberSecurity

Detecting and Exploiting the HTTP PUT Method

Detecting and Exploiting the HTTP PUT Method: I recently found a web server which allowed the HTTP PUT Method. This was detected and proven vulnerable by a Nessus vulnerability scan...

venerdì 5 settembre 2014

sabato 23 agosto 2014

thepcn3rd: nmap bash script

thepcn3rd: nmap bash script: Designed this nmap bash script to be able to run multiple different scans to pull information that is relevant and save it to unique files. ...

5 things you need to know about the Secure Socket Layer (SSL

5 things you need to know about the Secure Socket Layer (SSL) - Computer Business Review

giovedì 24 aprile 2014

Covert Channels: Software

Covert Channels: Software: Steganography: F5 is a steganography algo for hiding information in JPEG images. Westfeld A. F5ea steganographic algorithm (high capa...