Home
Contact us
Links
Disclaimer
Social Profiles
Popular Posts
The Volatility Framework: Volatile memory artifact extraction utility framework
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extr...
Google opens a pharmacy? It’s spam of the day
MessageLabs Intelligence recently tracked a new pharmaceutical spam campaign promoting a supposedly "Google-accredited" onlin...
DNS Poisoning Via Port Exhaustion
Whitepaper called DNS Poisoning Via Port Exhaustion. It covers everything from how DNS poisoning works to various methods of performing ...
A Beginners Guide to Linux
Table of Contents Overview Prerequisites Learning objectives Conventions Introduction The Linux File System Getting ...
A little guide for linux distros
Hi Security Explorers, Linux is growing really fast now a days and i believe it is the future of OS. Anyway there is still a lot of Linu...
Thursday, October 27, 2011
Using QR Tags To Attack Smart Phones
8:28 PM
Whitepapers
No comments
Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.
Authored by Augusto Pereyra
Download
Email This
BlogThis!
Share to X
Share to Facebook
Newer Post
Older Post
Home
0 comments:
Post a Comment
0 comments:
Post a Comment