Home
Contact us
Links
Disclaimer
Social Profiles
Popular Posts
Joomla Component (com_content) - Blind SQL Vulnerability
Date: ===== 2011-11-11 References: =========== http://www.vulnerability-lab.com/get_content.php?id=323 VL-ID: ===== 323 Introduction: ...
Vega Web Security Scanner 1.0 Beta
Vega is a GUI-based, multi-platform, free and open source web security scanner that can be used to find instances of SQL injection, cross-...
WAF bypass Using Sql Injection
Video Demonstartion Hello Security Explorers , Welcome to Security Explored This is the next tutorial in Sql Injection Series. WAF Bypass...
How To Use Thc-Hydra
Credit goes to InsecureStuff Here is the direct link to download the windows package of thc-hydra: *Link Updated* http://freeworld....
DEFCON 19: Build your own Synthetic Aperture Radar
Speaker: Michael Scarito Radar is used extensively by the military, police, weather, air travel, and maritime industries - why not you...
Thursday, October 27, 2011
Using QR Tags To Attack Smart Phones
8:28 PM
Whitepapers
No comments
Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.
Authored by Augusto Pereyra
Download
Email This
BlogThis!
Share to X
Share to Facebook
Newer Post
Older Post
Home
0 comments:
Post a Comment
0 comments:
Post a Comment