March 19th, 2012 | by NJ Ouchn
Citrix ICA is a complex multi-layered protocol which uses multiplexed frames, compression and encryption over a single TCP connection. Rather [&hellip
March 19th, 2012 | by NJ Ouchn
The presentation will discuss the vulnerability XPATH Injection in depth and we will cover advanced exploitation techniques. We will talk [&hellip
March 19th, 2012 | by NJ Ouchn
The tools exploit xpath injection vulnerability in web applications and support advanced exploitation features. Both Xpath 1.0 and 2.0 are [&hellip
March 19th, 2012 | by NJ Ouchn
Didier has released several free open source tools to help with the analysis of (malicious) PDF files. These tools are [&hellip
March 19th, 2012 | by NJ Ouchn
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful [&hellip
March 19th, 2012 | by NJ Ouchn
What is Seccubus? Seccubus automates regular vulnerability scans and provides delta reporting. The goal is to reduce the analysis time [&hellip
March 19th, 2012 | by NJ Ouchn
cvedetails.com is a security vulnerability database website, which collects data from multiple sources and provide some unique features like statistics, [&hellip
March 18th, 2012 | by NJ Ouchn
Well, if you don’t believe me, see this video about Risk Management by a friend of mine @J4vv4D ps: Video [&hellip
March 18th, 2012 | by MaxiSoler
The Black Hat Briefings have become the biggest and the most important security conference series in the world by remaining [&hellip
February 29th, 2012 | by MaxiSoler
Blackhat Briefings have become the biggest and the most important security conference series in the world by remaining true to our [&hellip