↧
Connect-Back Shell (Literally)
By: Cris Neckar In the world of web app hacking undoubtedly the most annoying stage of exploitation is the purgatory between a working exploit and a working shell. It’s that place where your exploit...
View ArticleLocal File Inclusion – Tricks of the Trade
By: Cris Neckar, Andrew Case Everyone understands that local file includes are bad. The ability to execute an arbitrary file as code is unquestionably a security risk and should be protected against....
View ArticleSmart TV + Smartphone = Shiny New Attack Surfaces
According to a Gartner report from December 2012, “85 percent of all flat-panel TVs will be Internet-connected Smart TVs by 2016.” Forbes magazine gives some analysis about what is fueling this trend:...
View Article