Tag Archives | web-applications

Binging (BETA) – Footprinting & Discovery Tool (Google Hacking)

It’s been a while since I’ve seen a tool of this type, back in the heydays of Google Hacking (which became the generic term for information gathering via search engines) there were multiple tools such as Gooscan and Goolag. Binging is a simple tool to query Bing search engine. It will use your Bing API […]

Tags: , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Privacy, Web Hacking | Add a Comment

Microsoft Opens the Gates to Hack Their Web Services

It seems like Microsoft are starting to get serious about security, in a very progressive move they have said they are ok with ethical hackers finding security flaws in their online services. It’s been fairly ok so far to hack away at software installed on your own hardware, but hitting remotely hosted applications has been […]

Tags: , , , , , ,

Posted in: General Hacking, Legal Issues, Web Hacking | Add a Comment

SIFT Web Method Search Tool

SIFT has just published a world-first tool for identifying rogue web methods. The Web Method Search tool is a Windows based application that uses a hybrid dictionary attack in an attempt to find unpublished administrative and other web services functions. As web services are becoming more prevalent, poor security practices from previous generations of application […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

Academic Papers on Web Application Security

I found a useful resource containing a whole list of academic papers on web-application security. This list represents an attempt to collect academic papers on the subject of Web application security sorted by the year of publication. Hacking web applications has become a big thing in the last 5 years, just look at the number […]

Tags: , , , , , , ,

Posted in: Web Hacking | Add a Comment

Security Researchers Afraid to Reveal Vulnerabilities

Well it happened a while back, remember? The French researcher Guillaume Tena who got in trouble for breaching French copywrite laws by decompiling some software. Now people are generally starting to worry about disclosing vulnerabilities through any channels, does there need to be some kind of anonymous PGP key based system for vulnerability disclosure? So […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Legal Issues | Add a Comment

Sprajax – An Open Source AJAX Security Scanner

Denim Group Ltd. announced today the public release of Sprajax, an open source web application security scanner developed to assess the security of AJAX-enabled web applications. Sprajax is the first web security scanner developed specifically to scan AJAX web applications for security vulnerabilities. Denim Group, an IT consultancy specializing in web application security, recognized that […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

AJAX: Is your application secure enough?

Introduction We see it all around us, recently. Web applications get niftier by the day by utilising the various new techniques recently introduced in a few web-browsers, like I.E. and Firefox. One of those new techniques involves using Javascript. More specifically, the XmlHttpRequest-class, or object. Webmail applications use it to quickly update the list of […]

Tags: , , , , , , , , ,

Posted in: Countermeasures, Exploits/Vulnerabilities, Web Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·