This is my first article in an international arena. Basically, from my web...
This is my first article in an international arena. Basically, from my web application testing background, I will share a …Read More
With so many data breaches and hackers breaking into systems, companies constantly scan and improve their code, to make it …Read More
Exploiting blind SQL injections in ‘UPDATE’ and ‘INSERT’ statements without stacked queries by Sina Yazdanmehr
Overview The SQL injection attack was introduced around 1998 for the first time. This high-level risk vulnerability can be found …Read More
We would like to proudly present you the newest issue of PenTest Open, which is free to download for everyone …Read More
Inside IDS systems with SNORT and OSSIM: use your knowledge of network architecture and hardware to customize placement of IDS sensors and sniff traffic off the wire. Exploiting VoIP Systems: theoretical and practical aspects about VoIP attacks and relatives countermeasures. Journey In The World of The XSS: Impress your customers with awesome Proof of Concept far beyond the classic pop-up. Metasploit Framework: how to apply the incredible capabilities of the Metasploit Framework in a comprehensive penetration testing and vulnerability assessment regimen, according to a thorough methodology for performing effective tests.Read More