Search:

Type: Posts; User: mandi

Page 1 of 2 1 2

Search: Search took 0.14 seconds.

  1. Company is in Chennai India but the client...

    Company is in Chennai India but the client belongs to overseas. They are very much concerned about finding evidence . We are not sure about the Indian police in this field. Can you point to some...
  2. is it possible to find usb file copy logs in windows 7?

    Hi Friends,
    we had a scenario,in my friends company an employee(who is in high position) has copied some highly classified
    files when leaving the company,we are trying to find some evidence for it....
  3. Replies
    12
    Views
    14,520

    @amolnaik4----> First of all sorry for the late...

    @amolnaik4---->
    First of all sorry for the late reply,I didn't came to online for the past few days,
    And Thanks for answering my questions and also Thank you for creating a reference kind of video...
  4. Replies
    12
    Views
    14,520

    you mentioned a nice point :) Assume like this...

    you mentioned a nice point :)

    Assume like this if the admin owns a high profile site and if the attacker wants to pwn the admin,even he can set up a xss vulnerable forum and post a attractive...
  5. Replies
    12
    Views
    14,520

    Thanks amolnaik4 for replying :) I'm not...

    Thanks amolnaik4 for replying :)




    I'm not aware about the xsssqli attack you mentioned. Will be better if you can link the post or the resource you used


    I am just a beginner and i have...
  6. Replies
    12
    Views
    14,520

    Xss through sqli ?

    Hi friends,I am just a starter in web-app sec

    I got reading some stuff as usual i ended up with some doubts ,so i decided to ask here,

    say a phbb forum has a stored xss
    and also assume the...
  7. Replies
    21
    Views
    17,690

    Sticky: Thanks for sharing your experience mate...... :)...

    Thanks for sharing your experience mate...... :) very nice....
  8. Replies
    2
    Views
    2,511

    Logging httponly cookies?

    Logging httponly cookies?

    I have been reading some e-books regarding the following topics
    httponly cookies,xst attacks,http "trace".i ended up with some doubts so i tought of asking here

    1)i...
  9. Thread: Did You Know?

    by mandi
    Replies
    26
    Views
    13,675

    microsoft is hosting their website on linux...

    microsoft is hosting their website on linux servers :)

    http://i52.tinypic.com/se1w21.jpg

    just seen this some where today...
  10. Thanks to every one who posted here ,especially...

    Thanks to every one who posted here ,especially to "Hackuin
    ",I've got it....
  11. Blackhat USA-State of the Art Post Exploitation in Hardened PHP Environments e-book

    while i am surfing the internet i found out this e-book,
    it looks interesting..


    State of the Art Post Exploitation in Hardened PHP Environments

    e-book:

    ...
  12. 1. Use OPTIONS to find out HTTP methods supported...

    1. Use OPTIONS to find out HTTP methods supported by the web server. The "Allow" header in server response will have HTTP methods supported by web server. The procedure has been demonstrated on the...
  13. How to find the various http methods supported by a web-server MANUALLY ?

    I have been reading some Interesting articles regarding hacking the servers with HTTP methods..

    I found it interesting,

    As far as to my knowledge i had heard there were only 8 http methods ,
    ...
  14. I want to see the plain text aka traffic inside...

    I want to see the plain text aka traffic inside the encryption with-out getting known to the victim,

    in simple i want to do like this ..

    victims encrypted traffic------> attacker decrypt the...
  15. can't get u? any more useful advice please?

    can't get u? any more useful advice please?
  16. i can see the traffic sir,but i want to...

    i can see the traffic sir,but i want to re-encrypt the things and make sure that my victim should not know i am sniffing his traffic,that is my main concern,
    Also for me sniffing the IP-SEC is tough...
  17. [help]Sniffing encrypted traffic with-out breaking the encryption?

    I have been playing with sniffers in some networks,but after a point i am bored of traditional sniffing,most people here using some sort of encryptions like ssl,ssh,IP-SEC,Also as IP-V4 addresses are...
  18. Replies
    1
    Views
    3,667

    nice 1,But i expected some brief descriptions,...

    nice 1,But i expected some brief descriptions,...
  19. Replies
    6
    Views
    9,723

    It will be good ,if you post some...

    It will be good ,if you post some information,screen-shot about the contents inside the files...
  20. Replies
    14
    Views
    5,572

    Hat's off to you,many congrats bro!!!

    Hat's off to you,many congrats bro!!!
  21. Replies
    4
    Views
    2,309

    okay guys, i am gonna write in a fashion so that...

    okay guys, i am gonna write in a fashion so that you can understand easily,To be honest before some-days when i saw this thing first i do struggled to understand,but after that after spending some...
  22. Replies
    4
    Views
    2,309

    End of Network Hacking?

    Everything can be hacked!

    That’s a quote I love, you hear it all over the net. Most people reversing software/hardware or people penetrating highly secure (or at least claimed) networks, state...
  23. uhh,No,I am not that kind of guy,I just tried to...

    uhh,No,I am not that kind of guy,I just tried to discuss the thing,if you guys thinking that i am strange i am sorry,and i tender an apology to the guys who posted here ,I am waiting and willing to...
  24. Creating Broadcast storms to take down a switched Network?

    I am willing to Take down a LAN Network with Broadcast storms,
    Before that here is the topology of our overall Network


    Please have a look at the following image which will represent The network...
  25. To be honest i got this idea mostly by my...

    To be honest i got this idea mostly by my thinking and some researching,
    Best way to example my tought,According to IANA we should use port 22 for ssh service,But most hackers running ssh services...
Results 1 to 25 of 32
Page 1 of 2 1 2