Home
Contact us
Links
Disclaimer
Social Profiles
Popular Posts
Tor 0.2.2.34 Released with fixes of anonymity vulnerability
Tor 0.2.2.34 fixes a critical anonymity vulnerability where an attacker can deanonymize Tor users. Everybody should upgrade. The attac...
MD5 Theory and Cracking
Hello guys we are all back to work..... I got this tutorial on http://www.breakthesecurity.com I found this tutorial interesting ,.so...
wifite - WEP/WPA Password Cracker for BT4
introduction designed for Backtrack4 distribution of Ubuntu; works great with BlackBuntu ! Linux only; no windows or osx support. do...
WordPress Security Scanner 1.1
Introduction WPScan is a vulnerability scanner which checks the security of WordPress installations using a black box approach. Download Pl...
Ubuntu for Phones!
Now the most popular Linux distribution is finally introducing its phone version take a look at the video to find out all the details. ...
Thursday, October 27, 2011
Using QR Tags To Attack Smart Phones
8:28 PM
Whitepapers
No comments
Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.
Authored by Augusto Pereyra
Download
Email This
BlogThis!
Share to X
Share to Facebook
Newer Post
Older Post
Home
0 comments:
Post a Comment
0 comments:
Post a Comment