Home
Contact us
Links
Disclaimer
Social Profiles
Popular Posts
WAF bypass Using Sql Injection
Video Demonstartion Hello Security Explorers , Welcome to Security Explored This is the next tutorial in Sql Injection Series. WAF Bypass...
Joomla Component (com_content) - Blind SQL Vulnerability
Date: ===== 2011-11-11 References: =========== http://www.vulnerability-lab.com/get_content.php?id=323 VL-ID: ===== 323 Introduction: ...
wifite - WEP/WPA Password Cracker for BT4
introduction designed for Backtrack4 distribution of Ubuntu; works great with BlackBuntu ! Linux only; no windows or osx support. do...
The Volatility Framework: Volatile memory artifact extraction utility framework
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extr...
DEFCON 19: How Misdirection Can Be Used To Steal Information Without Being Detected
Speaker: Bruce "Grymoire" Barnett There are many similarities between professional hackers and professional magicians. Magici...
Thursday, October 27, 2011
Using QR Tags To Attack Smart Phones
8:28 PM
Whitepapers
No comments
Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.
Authored by Augusto Pereyra
Download
Email This
BlogThis!
Share to X
Share to Facebook
Newer Post
Older Post
Home
0 comments:
Post a Comment
0 comments:
Post a Comment