Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 06/21/18 in all areas

  1. While SQL injection has been intensively examined by the research community, limited work has been done so far for identifying XML injection and parameter tampering vulnerabilities. Database-driven web applications today rely on XML databases, as XML has gained rapid acceptance due to the fact that it favors integration of data with other applications and handles diverse information. Hence, this work proposes a black-box fuzzing approach to detect XQuery injection and parameter tampering vulnerabilities in web applications driven by native XML databases. A prototype XiParam is developed and tested on vulnerable applications developed with a native XML database, BaseX, as the backend. The experimental evaluation clearly demonstrates that the prototype is effective against detection of both XQuery injection and parameter tampering vulnerabilities. Full paper: https://link.springer.com/article/10.1007/s10207-016-0359-4
    2 points
  2. Most work on DOM Cross-Site Scripting (DOM-XSS) detection methods can be divided into three kinds: black-box fuzzing, static analysis, and dynamic analysis. However, black-box fuzzing and static analysis suffer much from high false negative rates and high false positive rates respectively. Current dynamic analysis is complex and expensive, though it can obtain more efficient results. In this paper, we propose adynamic detection framework (TT-XSS) for DOM-XSS by means of taint tracking at client side. We rewrite all JavaScript features and DOM APIs to taint the rendering process of browsers. To this end, new data types and methods are presented to extend the semantic description ability of the original data structure, based on which we can analyze the taint traces through tainting all sources, sinks and transfer processes during pages parsing. In this way, attack vectors are derived to verify the vulnerabilities automatically. Compared to AWVS 10.0, our framework detects more 1.8% vulnerabilities, and it can generate the corresponding attack vectors to verify 9.1% vulnerabilities automatically. Download paper:
    2 points
  3. Banesimtitestimancaneaicoaiele
    1 point
  4. While fuzzing is known to be a powerful mechanism for fingerprinting and enumerating bugs within hardware and software systems, the application of this technique to wireless systems remains nontrivial due to fragmented and siloed tools. Join us as we cover wireless fuzzing fundamentals and introduce a new tool to unify the approach across protocols, radios, and drivers. About the Speakers Matt Knight Matt Knight (@embeddedsec) is a center and left wing for the San Francisco Desert Owls ice hockey team. When his schedule allows he moonlights as a software engineer and security researcher, where he explores the boundaries between software, hardware, and wireless systems. With specific interests in RF networks and physical layers, he notably reverse engineered the LoRa PHY based on blind signal analysis. Matt holds a BE in Electrical Engineering from Dartmouth College. Ryan Speers Ryan Speers is a security researcher and developer who enjoys embedded systems, low-power radio protocols, and reversing proprietary systems. He has worked in offensive and defensive roles on networks, Windows, micro controllers, and many things in-between. As co-founder at River Loop Security, he tests embedded systems for security issues, and helps clients build more secure systems. He is also Director of Research for Ionic Security where he leads system and cryptographic research. He has previously spoken at a number of security conferences, including Troopers 14, and written some articles for journals ranging from peer-reviewed academic publications to PoC link: https://www.troopers.de/troopers18/agenda/rgdyd3/
    1 point
  5. Dumnezeu cu googlelul: https://linustechtips.com/main/topic/189878-fx-6300-3-cores/ Adica e virtualizare hardware a nucleelor. Arhitectura e dupa parerea mea aiurea, dar aia e. Nota: 1. Ma cam zgarie pe creier ca le numesti Threaduri. Threadurile suna cam software, eu le zic "core"(nuclee) referindu-ma la interfata catre un processing unit.(virtuala sau fizica) 2. Un core virtualizat, sau lipit pe un modul cu un alt core nu e la fel ca un core 'liber'. Sunt diferente destul de mari cand vine vorba de memorie si contex switch. Ryzen a avut probleme foarte mari la lansare pt ca 'infinity fabricul' lor nu era optimizat pt contex switchuri intre nuclee. Sumar: Processorul tau are 6 nuclee in 3 module. Sistemul de operare foloseste 3 nuclee(reprezentate de cele 3 module) dar fiecare modul are 2 processing units.
    1 point
  6. Iti faci cont pe team4play - la sectiunea pay for vip ai hack la 14 $.
    1 point
  7. ce'ai ma, cu 20 euro traiesc o luna, esti nebun
    1 point
×
×
  • Create New...