Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
Q and A for any cross site scripting information. Feel free to ask away. 

Current Page: 1 of 1
Results 1 - 9 of 9
1 year ago
qreck
At present we now have an integrated architecture where Industrial Control Systems are no longer isolated from traditional networking equipment. In fact, a quick search using the SHODAN search engine will reveal thousands of NiagaraAX devices accessible over the Internet. A weakness within this system could allow an attacker access to critical environmental controls. This revelation motivated h
Forum: News and Links
1 year ago
qreck
QJax has shared a great hacking video showing #Tridium #ICS and Building Automation at Risk! http://vimeo.com/56069427 Follow:@SSKblog
Forum: News and Links
2 years ago
qreck
This video will demonstrate how a simple XSS vulnerability can be leveraged to gain complete control of your web-browser and eventually lead to a complete system compromise. 1. We will use a cross-site scripting vulnerability as the initial attack vector 2. Exploit XSS by redirecting the user’s browser to the Evil_IP with a JavaScript loop (every 2 secs) 3. Exploit the victim’s browser
Forum: News and Links
3 years ago
qreck
For those having trouble getting the Cross-site Scripting Framework (XSSF) installed into MetaSploit on an Ubuntu distro, here are some good notes to get around those annoying errors. I hope this saves someone a few CPU cycles. If you have not heard of XSSF then do a GTS (Google That Shit!) http://securitystreetknowledge.com/?p=445
Forum: XSS Info
3 years ago
qreck
Well the trick with improving speed is to try to pick the fastest ExitNode in the country you wish to be in. However, has any one noticed that often the fastest ExitNodes are in the US and tend to be near areas of state-sponsored cyber-defense institutions? Makes me a bit suspicious after I do a GeoIP lookup and it is sitting somewhere in Virginia, Colorado, Texas. Or have I gotten way to parano
Forum: News and Links
3 years ago
qreck
As a good penetration tester, you should consider hiding your IP address after it has been determined that the target utilizes dynamic shunning to block the attackers’ source IP address. Also, the mere threat of a upcoming penetration test can travel around an IT staff like the plague. Eventually, you will run up against Network Administrators trying to cover their a$$ by setting up a firewall r
Forum: News and Links
3 years ago
qreck
http://securitystreetknowledge.com/?p=139
Forum: News and Links
4 years ago
qreck
Here is a video of a network scanner running on the new Android Incredible over a WiFi connection. The port scan is FAST and it allows you to make a direct HTTP connection from the screen. http://securitystreetknowledge.com/?p=105
Forum: News and Links
4 years ago
qreck
Are you booting Backtrack in a VMware and then trying to see the PCMCIA card? The VMware will not have hardware access to the PCMCIA socket. If you are booting Backtrack directly from a CD or USB you should see it as WLAN0.
Forum: Wireless Security
Current Page: 1 of 1