cnbird's blog

cnbird's blog

Web 安全威胁与对策

2010-02-28 00:30:00

阅读数 588

评论数 0

Apache Tomcat unexpected file deletion and/or alteration Severity: LowVendor:The Apache Software FoundationVersions Affected:Tomcat 5.5...

2010-02-27 13:56:00

阅读数 586

评论数 0

Citrix Hacking

**This post is late, i realize the "buzz" about the topic is way past but...Over on the gnucitizen blog (if you dont read that blog you sho...

2010-02-27 02:31:00

阅读数 641

评论数 0

Oracle TNSLSNR Full Client

Most of admins neglect setting password on TNSlsnr Clients for Oracle databases. Oracle ensures that you can either connect to TNSlsnr on a localhost...

2010-02-27 02:03:00

阅读数 1129

评论数 0

DNS/HTTP Enumeration in oracle

默认ORACLE密码Default Oracle Passwords has a couple of stored procedures that ...

2010-02-27 02:00:00

阅读数 581

评论数 0

Input Validation Cheat Sheet

Related articles: SQL Injection Cheat Sheet We sometimes carelessly throw characters up and about in an attempt to find a gem. This paper covers misc...

2010-02-27 00:58:00

阅读数 906

评论数 0

Reverse Shell with Bash

2010-02-27 00:55:00

阅读数 675

评论数 0

Reducing Information Disclosure in WCF Data Services

Previously, I wrote an article titled "Reducing Information Disclosure in ASP.NET Web Services".  The article identified steps developers c...

2010-02-26 23:57:00

阅读数 549

评论数 0

A XSS Vulnerability in Almost Every PHP Form I’ve Ever Written

Ive spent a lot of time over the past few months writing an enterprise application in PHP.  Despite what some people may say, I believe that PHP is a...

2010-02-26 23:55:00

阅读数 1038

评论数 0

Nagios plug-in development guidelines

Nagios plug-in development guidelines plug-in API

2010-02-26 21:02:00

阅读数 761

评论数 0

Analyzing Enterprise PKI Deployments

2010-02-26 13:27:00

阅读数 556

评论数 0


2010-02-26 13:25:00

阅读数 731

评论数 0

perl 视频教程

2010-02-26 11:29:00

阅读数 840

评论数 0

Mysql替代解决方案Cassandra Cassandra是一套开源分布式数据库管理系统。它最初由Facebook开发,用于储存特别大的数据。主要特性:分布式 基于colu...

2010-02-26 11:05:00

阅读数 1469

评论数 0

ISPConfig 下载地址以及配置

2010-02-26 10:59:00

阅读数 637

评论数 0

Defense in Depth using OSSEC and other free tools

Russ McRee wrote an excellent article about OSSEC for the October 2009 issue of ISSA Journal. (Disclaimer: I contributed to the article.) He then wen...

2010-02-25 10:30:00

阅读数 860

评论数 0

Nsploit - Popping boxes with Nmap it allows to pass through nmap to Metasploit and then...

2010-02-24 09:48:00

阅读数 466

评论数 0

Running a command on every machine in your domain from the command line After listening to Larrys excellent technical segment on dumping the event logs fro...

2010-02-24 09:34:00

阅读数 631

评论数 0

Links between forensics and pen tests year on the show, Marcus J. Carey presented a tech segment about using memory analysis i...

2010-02-24 09:32:00

阅读数 612

评论数 0

Cara menanam shell lewat LFI (Local file disclosure) dengan metode proc/self/environ

Cara menanam shell lewat LFI (Local file disclosure) dengan metode proc/self/environPenulis : gunslinger_dengan tutorial ini saya akan menjelaskan ba...

2010-02-24 08:57:00

阅读数 1261

评论数 0

取消 删除