Quantcast
Channel: Neohapsis Labs » exploitation
Browsing latest articles
Browse All 3 View Live

Image may be NSFW.
Clik here to view.

Connect-Back Shell (Literally)

By: Cris Neckar In the world of web app hacking undoubtedly the most annoying stage of exploitation is the purgatory between a working exploit and a working shell. It’s that place where your exploit...

View Article


Image may be NSFW.
Clik here to view.

Local File Inclusion – Tricks of the Trade

By: Cris Neckar, Andrew Case Everyone understands that local file includes are bad. The ability to execute an arbitrary file as code is unquestionably a security risk and should be protected against....

View Article


Image may be NSFW.
Clik here to view.

Smart TV + Smartphone = Shiny New Attack Surfaces

According to a Gartner report from December 2012, “85 percent of all flat-panel TVs will be Internet-connected Smart TVs by 2016.” Forbes magazine gives some analysis about what is fueling this trend:...

View Article
Browsing latest articles
Browse All 3 View Live