Security500 [Application Security] The Ins and Outs of Database Audit and Assessment 2012. 5. 3. [Download] OWASP Cloud Top10 Risks [파일 다운 받기] 2012. 4. 24. Exploit Pack - Web Security This tool allows you to take control of remote browsers, steal social network credentials, obtain persistence on it, DDoS and more. Main features: - Hacking of Gmail, Yahoo, Facebook, Live, Linkedin - Session persistence - 0day exploits included - Remote browser control - DDoS by creating botnets - Launch remote exploits - Steal credentials [출처 : http://exploitpack.com] 2012. 4. 24. [Video] OWASP Top10 - 2010 [T10 Architecture Diagram] A1-InjectionInjection flaws, such as SQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data.A2-Cross Site Scripting (XSS)XSS flaws occur whenever an application takes untrusted data and sends it.. 2012. 4. 23. 이전 1 ··· 118 119 120 121 122 123 124 125 다음