Home
Contact us
Links
Disclaimer
Social Profiles
Popular Posts
WAF bypass Using Sql Injection
Video Demonstartion Hello Security Explorers , Welcome to Security Explored This is the next tutorial in Sql Injection Series. WAF Bypass...
DEFCON 19: Attacking and Defending the Smart Grid
Speaker: Justin Searle Senior Security Analyst at InGuardians, Inc. The Smart Grid brings greater benefits for utilities and customer a...
Joomla Component (com_content) - Blind SQL Vulnerability
Date: ===== 2011-11-11 References: =========== http://www.vulnerability-lab.com/get_content.php?id=323 VL-ID: ===== 323 Introduction: ...
DEFCON 19: IP4 TRUTH: The IPocalypse is a LIE
Speakers: Sterling Archer Field Agent, ISIS | Freaksworth Professor, Mars University There is a long tradition of researchers presenti...
Botnets Explained
Q: What's a bot? A: A bot is a malicious program which has several purposes. They are usually told what to do by a botnet admin a...
Thursday, October 27, 2011
Using QR Tags To Attack Smart Phones
8:28 PM
Whitepapers
No comments
Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.
Authored by Augusto Pereyra
Download
Email This
BlogThis!
Share to Twitter
Share to Facebook
Newer Post
Older Post
Home
0 comments:
Post a Comment
0 comments:
Post a Comment