background preloader

Phrack Magazine

Phrack Magazine

Vuforia Developer Portal HITB Quarterly Magazine 2600 News | 2600 Darpa Turns Oculus Into a Weapon for Cyberwar | Threat Level A Darpa contractor showing off the Oculus Rift cyberwar simulation at the Pentagon’s Darpa Demo Day. Photo: Andy Greenberg/WIRED For the last two years, Darpa has been working to make waging cyberwar as easy as playing a video game. Now, like so many other games, it’s about to get a lot more in-your-face. At the Pentagon Wednesday, the armed forces’ far-out research branch known as the Defense Advanced Research Projects Agency showed off its latest demos for Plan X, a long-gestating software platform designed to unify digital attack and defense tools into a single, easy-to-use interface for American military hackers. “You’re not in a two-dimensional view, so you can look around the data. In its demo setup, complete with two motion-sensing Razer Hydra controllers for navigation, the user does more than swim. That sort of admission will no doubt set off alarm bells for critics of the American military’s increasingly aggressive posture on the Internet.

SQL Injection Cheat Sheet Find and exploit SQL Injections with free Netsparker SQL Injection Scanner SQL Injection Cheat Sheet, Document Version 1.4 About SQL Injection Cheat Sheet Currently only for MySQL and Microsoft SQL Server, some ORACLE and some PostgreSQL. Samples are provided to allow reader to get basic idea of a potential attack and almost every section includes a brief information about itself. Examples; (MS) means : MySQL and SQL Server etc. Table Of Contents Syntax Reference, Sample Attacks and Dirty SQL Injection Tricks Ending / Commenting Out / Line Comments Line Comments Comments out rest of the query. -- (SM) DROP sampletable;-- # (M) DROP sampletable;# Line Comments Sample SQL Injection Attacks Username: admin'-- SELECT * FROM members WHERE username = 'admin'-- This is going to log you as admin user, because rest of the SQL query will be ignored. Inline Comments /*Comment Here*/ (SM) DROP/*comment*/sampletableDR/**/OP/*bypass blacklisting*/sampletableSELECT/*avoid-spaces*/password/**/FROM/**/Members /*!

Crean un mapa interactivo que muestra cómo se siente el mundo ahora El mapa fue creado por investigadores australianos del Instituto Black Dog y de la estatal Organización Conjunta de Estudios Científicos e Industriales (CSIRO, por sus siglas en inglés), que se dedican en particular al estudio de los trastornos del estado de ánimo. El mapa, llamado 'We feel' ('sentimos'), analiza millones de tuits publicados en todo el mundo y, a partir de estos, crea un gráfico que muestra cuántas personas en el mundo sienten alegría, amor, sorpresa, miedo, ira o tristeza. Monitorea cada día cerca de 27 millones de tuits, a veces llegan a ser hasta 32.000 tuits por minuto, buscando 600 palabras concretas que atribuye a seis emociones (sorpresa, alegría, amor, tristeza, ira y miedo) y algunas otras que clasifica en el grupo llamado 'otros'. Así se sentía América de Sur en transcurso del día sábado.

RFI Tutorial (remote file inclusion) Basically, the include function in PHP allows contents from local or remote files to be pretty much "copied and pasted" and executed in a script at runtime. Now suppose yo' dad wants a small website. All he wants is three pages.A blog page where he can update you on how many babies he has killed.A contact page with his email on it os people can ask advice on the best way to kill babies.An gallery page where he can show you pictures of all the babies he has killed. He creates four pages. blog.php, contact.php and gallery.php along with index.php, this is our "main" page that will contain a header, a side bar for navigation, some php and a footer. You would view the pages on his website like this.Code: for header//html for menu$page = $_GET['page'];include($page);? This means when we go to Code: What's wrong with this? Say we change "blog.php" to " Switching.

.Security of Things .Dan Geer, 7 May 14, Cambridge Thank you for your invitation and to the other speakers for their viewpoints and for the shared experience. With respect to this elephant, each of us is one of those twelve blind men. We are at the knee of the curve for deployment of a different model of computation. We've had two decades where, in round numbers, laboratories gave us twice the computing for constant dollars every 18 months, twice the disk drive storage capacity for constant dollars every 12 months, and twice the network speed for constant dollars every 9 months.

Hacking Articles,Backtrack Tutorials,Hacking Tricks,Penetration Testing,Metaspolit Tutorial Google And The Big Problem With "The Right To Be Forgotten" Europe's highest court recently ordered Google to delete search results if requested by its users, under the auspices of a "the right to be forgotten." On Friday, Google revealed a new website designed, specifically, to handle the tidal wave of takedown requests it will be receiving. It was a sweeping victory for anyone who has ever posted dumb, embarrassing crap to the Internet, and promised a fresh start for anyone with a worrisome digital trail that could come back to haunt them. To better understand the ruling, it can be instructive to recall a French law that recognizes le droit à l'oubli, or the "right to oblivion." Georgetown University Law professor Jeff Rosen describes it as "a right that allows a convicted criminal who has served his time and been rehabilitated to object to the publication of the facts of his conviction and incarceration." One glance at the paperwork should give you a good idea of the enormity of the task ahead.

remote-exploit.org

Related: