Home
Contact us
Links
Disclaimer
Social Profiles
Popular Posts
DEFCON 19: DCFluX in: License to Transmit
Speaker: Matt Krick "DCFluX" Chief Engineer, New West Broadcasting Systems, Inc. When cell phones, land lines and the intern...
WAF bypass Using Sql Injection
Video Demonstartion Hello Security Explorers , Welcome to Security Explored This is the next tutorial in Sql Injection Series. WAF Bypass...
DEFCON 19: DEF CON Awards
DEF CON Awards
Botnets Explained
Q: What's a bot? A: A bot is a malicious program which has several purposes. They are usually told what to do by a botnet admin a...
How to survive with a slow internet connection
I lost my broadband before some months and using a 2g phone as a modem which is (really) very slow, so i thought to write an article ab...
Thursday, October 27, 2011
Using QR Tags To Attack Smart Phones
8:28 PM
Whitepapers
No comments
Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.
Authored by Augusto Pereyra
Download
Email This
BlogThis!
Share to X
Share to Facebook
Newer Post
Older Post
Home
0 comments:
Post a Comment
0 comments:
Post a Comment