Did you see this video
Type: Posts; User: fb1h2s
Did you see this video
You can view the page at http://garage4hackers.com/content.php?r=177-Everything-you-need-to-know-about-CVE-2014-6271
More Pics from the stuffs brought by @rashid :788
Donate how much ever you could or win a bug bounty and donate that money for the relief program . Which ever option you choose, upload a selfie of that donation.
Hi buddy glad to see you here. Hope we will have some intresting discussions with you.
Buddy search on forum aslr, you will get a lot of resources.
You can view the page at http://www.garage4hackers.com/content.php?r=175-Low-hanging-Web-Application-bugs-in-Digital-Cable-Hacking-Cable-TV-Networks-Part-1
The following code belong to Apache http.config file. This config given below is used to configure perl cgi on apache for a particular directory. But this config is flawed and could create a series...
@vikram consider time as your investment . If possible do not chose a job because you are in need of money. Stay focused on what you love to do and learn as much as possible. Start working only when...
You can only reject blank referrers in POST request , not possible in GET request as the first request to the pages would obviously not have referrer. Else the will have to maintain the state in...
I have seen developers relying on using HTTP referer header as a method of mitigating CSRF. One of the reason is that it is proposed in the OWASP
CSRF mitigation techniques. Even though the article...
So am curious how has Burpsuite done this ? Assuming you have already checked burpsuite code.
You can view the page at http://www.garage4hackers.com/content.php?r=168-CVE-2014-0160-Heartbleed-Attack-POC-and-Mass-Scanner
This works mate
$salt = "AAA...AAA"; // Ax10k
Run it from a command line and check .
Excellent post mate expecting more form you. One doubt does Word 2010 install a 32 bit version or 64 bit version by default ?
See the bug will only work on Office 2010 . No other versons are vulnerable. So you are trying it out on the wrong target....
@narcissus, we can open it up only condition u will have to keep it updated :)
Dont think about a tool if ur just starting, take the pain of going through each line of code in a good text editor, and search over a huge code source manually for common patterns. Once ur get...
Please do share some more works
|blog post's as well.
Cool so we have some more cool people joining .
You can view the page at http://www.garage4hackers.com/content.php?r=157-A-weekend-with-Cisco-Meraki-Bug-Bounty-a-tale-of-few-web-bugs-.
Thanks and Regards.
0:000> !analyze -v
632476de 8b400c mov eax,dword ptr [eax+0Ch]
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)...
I had some issues resolving chrome symbols, so cdnt do proper analysis.But I dont think there is a possibility of making it exploitable. You should report to vendor and wait a longer time :P before...
@webdevil cool ,were we aware of a poc to trigger the bug via FF or any other browsers back then ??