KPMG Cyber Challenge 2016

Today at KPMG, we are hosting many enthusiasts from nominated universities in Malaysia for a very exciting event Cyber Challenge 2016. This is the second year that this event is conducted. Last year we received a very good feedback, hence we decided to expand the number of participants to a total number of 65 teams, […]

Read More

Silent SMS can track your whereabouts

Short Message Type 0, also called silent SMS or Stealth SMS or Ping SMS, is used to check the availability of the receiver, and it has been around for years. The device that it is sent to “must acknowledge receipt of the short message but may discard its contents”, as is stated in the GSM […]

Read More

Firefox Add-ons for Security Researchers and Penetration Testers

FoxyProxy Standard FoxyProxy is an advanced proxy management add-on for Firefox browser. It improves the built-in proxy capabilities of Firefox. There are few other similar kind of proxy management add-ons available, but it offers more features that other add-ons. Based on the URL patterns, it switches internet connection across one or more proxy servers. When […]

Read More

What does Vulnerable Column mean in UNION SELECT

Let’s say on your server-side code, you have this code: [crayon-5dec5c567ff08500212286/] So using this injection: [crayon-5dec5c567ff17707388034/] Would result in SQL statement as below: [crayon-5dec5c567ff1c756293377/] If on the client-side (UI), “2” and “3” are displayed¬†in the “title” and “description” fields, then we can say column 2 and column 3 of that table are vulnerable, which means […]

Read More

Powered by themekiller.com anime4online.com animextoon.com