:::: MENU ::::
Browsing posts in: Blog

SQL Fuzzing for fun and profit

Interesting article on SQL Injection Fuzzing.

This article is going to talk about Obfuscated SQL Fuzzing. Nowadays all high profile sites found in financial and telecommunication sector use filters to filter out all types of vulnerabilities such as SQL, XSS, XXE, Http Header Injection e.t.c. In this particular article we are going to talk only about Obfuscated SQL Fuzzing Injection attacks.

First of all what obfuscate means based on the Dictionary.com:

“Definition of obfuscate: verb (used with object), ob¬∑fus¬∑cat¬∑ed, ob¬∑fus¬∑cat¬∑ing.

  • To confuse, bewilder, or stupefy.
  • […]

  • Fun – Chunk Norris facts

    NewImageThis is very funny in a nerdy way…

    Chunk Norris is the cyber brother of Chuck Norris. He is a computer programmer and hacker. He was the first to allocate a chunk of memory, before memory was created.

    Link: fotis.loukos.me

    Security Risk in Firefox: How to turn off Firefox’s New Tab Page Completely | About Security


    If you’re using Firefox, you should be awareof a possibility of information leakage through the new Tab Page that may disclose confidential information through the screenshots that are presented.

    You should turn of this feature for the time being, as described in the article below.

    Link: aboutse.cc

    How to drink whisky


    Very insightful video on Whisky testing

    Ice? No Ice? Water? More whisky? Coke? Lemonade? How do you drink your whisky? It’s caused pub arguments for centuries and here’s Whyte & Mackay Master Blender Richard Paterson to show you why ice is a bad idea, water is OK – and why you should dip your finger in the water jug.

    The malware factory

    Interesting read…

    Article Published on¬†The Hacker New Magazine ‚Äì June Edition ‚ÄúMalware‚Äù With the term malware we refer a heterogeneous family of malicious software designed with the purpose to disrupt computer operation, gather sensitive information, or gain unauthorized access to victims systems. With the term we indicate in fact several types of malicious code such as computer viruses, worms, trojan, spyware, ramsonware, adware, rootkits, and other applications. In recent years we have witnessed an unprecedented growth in the development of malware linked to rapidly changing of […]


    Interesting article!

    For many new Mac owners, the move to Mountain Lion represents your first major upgrade. To help users prepare to make the jump, Erica Sadun and I wrote Getting Ready for Mountain Lion, an Amazon/iBooks eBook. It's aimed at first-time upgraders and people looking for hints and tips about smoothing the transition. We're sharing some of our tips on TUAW in a series of posts about the 10.8 upgrade.

    Although most Mac OS X upgrades go smoothly, there's always a chance that something can go wrong. Hundreds of thousands of files are changed during an upgrade, so there's a possibility that one or more of those changes can cause your Mac to decide to not boot up properly. Without a backup, your data might be gone forever.


    Apple quietly publishes public guide to iOS security

    Finally some guidelines from Apple

    Without fanfare, Apple has recently published an extensive guide to both the mechanics and the philosophy taken with regards to security in iOS, discussing the architecture, encryption, network security and interaction with other devices among other topics. The paper, which lays out the company's approach to security, basically demonstrates the advanced security concepts that have lead to such practices as the sandboxing of apps due to be copied into OS X Mountain Lion….