What Impact Does the Autocomplete Feature Have on Web Security?

What Impact Does the Autocomplete Feature Have on Web Security?

| | browser, feature, html
Modern web browsers release new features every day to improve user experience. One of the most popular and convenient features among users is the automatic completion of forms. The feature means that ...
Quick and Dirty BurpSuite Tutorial (2019 Update)

Quick and Dirty BurpSuite Tutorial (2019 Update)

Introduction In this article we look at BurpSuite, a framework of tools that can be used during penetration testing. We’ll cover the latest release of BurpSuite, version 2.0, getting our hands dirty ...

Popular Computer Forensics Top 21 Tools [Updated for 2019]

| | feature, forensics
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to ...
New Vulnerability Families Feature

New Vulnerability Families Feature

Netsparker is pleased to announce a new feature. It relates to how vulnerabilities are reported and will reduce the number of reported vulnerabilities, saving you time on the resources needed to address ...
Android Hacking and Security, Part 2: Content Provider Leakage

Android Hacking and Security, Part 2: Content Provider Leakage

| | feature, Hacking
In the previous article, we discussed how an attacker exploits vulnerable Activity Components and ways to secure them. In this article, we will discuss “Content Provider Leakage.” What... Go on to the ...

What is a Honey Pot?

| | feature, forensics, Hacking
1. Introduction Honeypots are special programs that are written for a sole purpose: to be exploited. Honeypots can emulate the existence of the vulnerability, so the attackers, viruses and worms are... Go ...

Crack Me Challenge Part 4

First we must take a look at the following piece of code that will be presented in the code segment 5: 004017FC |. B8 40000000 mov eax,40 00401801 |. 33C9 xor ecx,ecx ...

WireLurker, Masque: Every Apple iOS App Could Be Compromised

Wrong conviction and bad habits Before the introduction of the Masque vulnerability and related attacks, I desire to contextualize my analysis. The security community is assisting with the rapid rise... Go on ...

Gentoo Hardening: Part 4: PaX, RBAC and ClamAV [Updated 2018]

| | feature, forensics
Grsecurity and Xorg If we enable the “Disable privileged I/O” feature in the hardened kernel and reboot, we can’t start X server. That’s because Xorg uses privileged I/O... Go on to the ...

Nmap Evade Firewall & Scripting [Updated 2018]

| | feature, firewalls, Hacking, Nmap
Nmap is the most powerful scanner that is used to perform so many functions including port scanning, service detection, and even vulnerability detection. Nmap from beginner to advanced has covered... Go on ...
Loading...