Vulnerability40 728x90 WiFi Protected Setup PIN brute force vulnerability OverviewThe WiFi Protected Setup (WPS) PIN is susceptible to a brute force attack. A design flaw that exists in the WPS specification for the PIN authentication significantly reduces the time required to brute force the entire PIN because it allows an attacker to know when the first half of the 8 digit PIN is correct. The lack of a proper lock out policy after a certain number of failed attempts.. 2012. 1. 4. PHP Vulnerability Hunter All testing was performed on Windows XP and Vista using XAMPP. Each target application was installed, then a full scan was performed. Noteworthy log entries revealing exploitable faults are shown followed by the expoit proof of concepts and resulting advisories.Case Study 1: MODx Revolution 2.0.2-plReflected Cross-site Scripting Log EntryAlert Name: Reflected XSS GET /modx/manager/index.php?serv.. 2011. 11. 21. TimThumb vulnerability (WordPress plugins) Recently a new high risk vulnerability was discovered in the highly popular TimThumb script. TimThumb is a “A small php script for cropping, zooming and resizing web images (jpg, png, gif). Perfect for use on blogs and other applications.“ TimThumb is included in a lot of WordPress plugins and themes (free and paid). Exploiting this vulnerabilityan attacker can upload and excute a PHP file of hi.. 2011. 11. 11. Metasploit: The Penetration Tester’s Guide It gives me great pleasure to review this book ‘Metasploit – The Penetration Tester’s Guide’, not only because it is written on most popular penetration testing framework but the way it is written doing complete justice to the title!Here is the core information about the book,Title: Metasploit: The Penetration Tester’s GuideAuthor: David Kennedy, Jim O’Gorman, Devon Kearns, Mati AharoniPublisher.. 2011. 9. 28. Metasploit Framework 3.7.2 Released “The Metasploit Framework is a penetration testing toolkit, exploit development platform, and research tool. The framework includes hundreds of working remote exploits for a variety of platforms. Payloads, encoders, and nop slide generators can be mixed and matched with exploit modules to solve almost any exploit-related task.“ This is the official change log: Statistics: Metasploit now ships wi.. 2011. 6. 22. 이전 1 2 3 4 5 6 7 8 다음 728x90 728x90