archive
Date: October 2013

2013/10/25

User Input Sanitization – A Triple-Pronged Approach

by 8bits0fbr@in
Categories: Coding, Java, JavaScript, PHP
Tags: No Tags
Comments: 1 Comment

User Input Sanitization User input filtering, a.k.a. input sanitization, is one of the most important concepts within the security realm.  Improper handling of user input can lead to numerous vulnerabilities, including buffer overflows, SQL injection, command injection, format string attacks, etc.  Sadly, developers often overlook the importance of this practice. While this concept extends to[…]

2013/10/13

Using Reaver to brute force WiFi Protected Setup (WPS)

by DFIRninja
Categories: Penetration Testing
Tags: , , ,
Comments: Leave a Comment

Everything created nowadays have flaws, routers being one of them. Once vulnerabilities are surfaced, people are only steps behind to create tools to exploit those vulnerabilities. Reaver is an open-source tool created by “Tactical Network Solutions” capable of exploiting the WiFi Protected Setup (WPS) vulnerability discovered by security researcher Stefan Viehböck. What is WPS? Wi-Fi[…]

2013/10/05

Security Podcast Links: Getmon FTW!

by 8bits0fbr@in
Categories: News
Tags: , ,
Comments: Leave a Comment

The security realm is an ever-evolving creature.  No matter how much you learn about a particular topic, something new seems to pop up overnight.  As such, staying abreast of new threats; methods and procedures; and intelligence can be difficult.  Podcasts give the security professional a method by which we can absorb information “on the go,”[…]


Today is Wednesday
2017/08/23