Introduction to Command and Shell Code Injection Scenarios with Commix and Shellter:
This virtual yet realistic scenario was created to demonstrate some exploitation techniques using my favorite tools. We will exploit the web application command injection and Shellshock vulnerability using the...
Description
Take a few moments to imagine how your life would be like if you had the ULTIMATE FREEDOM in your life.
Money Freedom...
Time Freedom...
Location Freedom...
This is what affiliate marketing has helped me to achieve and it may be your life too.
Now I'll help you to achieve the...
How Can Android Smart Lock Be Attacked?
When the official details of the new features in Android 5.0 Lollipop were released last week, Android Smart Lock piqued my interest. It is a lock screen control feature that uses Bluetooth connectivity between a user’s Android 5.0 devices to unlock their...