Code injection

Results: 406



#Item
51Relational database management systems / Databases / SQL / SQL injection / Cross-site scripting / Code injection / Database connection / Password / Microsoft SQL Server / Data management / Computing / Data

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:27
52Software testing / Computer network security / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code injection / Fortify Software / JavaScript / Computer security / Cyberwarfare / Computing

Iron Chef Black Hat Brian Chess, Jacob West Sean Fay, Toshinari Kureha {brian, jacob, sean, tkureha}@fortify.com August 2, 2007 Iron Chef Black Hat is a competition between two tool-building titans: Sean Fay and Toshi Ku

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
53Scripting languages / PHP programming language / Relational database management systems / SQL / SQL injection / Cross-site scripting / Remote file inclusion / JavaScript / PHP / Computing / Software / Cross-platform software

Source Code Analysis in PHP Joseph Giron This paper is divided into 5 sections. Section 1: PHP basics Section 2: Tools to use

Add to Reading List

Source URL: www.gironsec.com

Language: English - Date: 2011-08-11 17:53:22
54PHP programming language / World Wide Web / Initialisms / PHP / Form / Vulnerability / HTTP cookie / Code injection / Session poisoning / Computing / Software / Computer security

Advanced PHP Security By: Ilia Alshanetsky What is Security? 

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2005-09-15 11:42:59
55Computer programming / PaX / Buffer overflow protection / Stack buffer overflow / Valgrind / Buffer overflow / Shellcode / X86 / Executable / Computing / Software bugs / Computer security

Randomized Instruction Set Emulation ∗ to Disrupt Binary Code Injection Attacks Elena Gabriela Barrantes David H. Ackley

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2003-09-09 13:38:33
56Software testing / Cross-site scripting / Hacking / SQL injection / Code injection / Vulnerability / HTTP cookie / JavaScript / SQL / Computer security / Cyberwarfare / Computing

Einfuehrung in die technische Informatik

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-12-14 13:41:33
57Control flow / INT / Interrupts / Hooking / Code injection / Windows API / Page / Kernel / Payload / Computer architecture / Computing / Malware

Blackout: What Really Happened Jamie Butler and Kris Kendall Outline ƒ ƒ

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
58Data synchronization / File hosting / Online backup services / Cloud applications / Dropbox / Cross-platform software / Dropship / Code injection / Python / Software / Computing / System software

Looking inside the (Drop) box Dhiru Kholia Openwall / University of British Columbia Abstract

Add to Reading List

Source URL: www.openwall.com

Language: English - Date: 2013-08-15 14:43:39
59Cyberwarfare / SQL / SQL injection / Cross-site scripting / Penetration test / Hacker / Insert / Code injection / Microsoft SQL Server / Computing / Data management / Relational database management systems

Website Security Website Planning How are websites “attacked”? • Access using stolen credentials Login details stolen using keyloggers etc.

Add to Reading List

Source URL: www.coursestuff.co.uk

Language: English - Date: 2015-01-28 07:05:34
60Risk / Software testing / Hacking / Cross-site scripting / Cross-site request forgery / Vulnerability / Code injection / Remote file inclusion / SQL injection / Cyberwarfare / Computer security / Failure

Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015

Add to Reading List

Source URL: www.atlassian.com

Language: English - Date: 2015-05-09 18:02:05
UPDATE