
Top Twenty Most Exploited Vulnerabilities in 2021
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
todayFebruary 13, 2022
Tools NJ Ouchn
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
todayFebruary 13, 2022
Tools NJ Ouchn
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
Tools + Interview + ToolsTube NJ Ouchn todayMarch 19, 2012
The tools exploit xpath injection vulnerability in web applications and support advanced exploitation features. Both Xpath 1.0 and 2.0 are supported. The tool allows extraction of entire XML database by exploiting the XPATH vulnerability in web application frameworks. Some of the advanced features which Xcat supports include:
Tom is a university student who finished his summer internship at 7Safe last year. During the internship Tom worked on several interesting aspects of IT Security. His research paper on Hacking XPATH 2.0 is the only material available on internet on this topic.
Written by: NJ Ouchn
Tagged as: XCat, Interview, Tom Forbes, XPATH 2.0, ToolsTube, Blackhat Europe 2012.
"Passion is needed for any great work, and for the revolution, passion and audacity are required in big doses"
Tools NJ Ouchn
Didier has released several free open source tools to help with the analysis of (malicious) PDF files. These tools are included in popular Linux distros like BackTrack and REMnux. One ...
Copyright 2019 Cyber Security Design Concept by QantumThemes.
Post comments (0)