zeroknock.blogspot.com
Pentester's Blog: CCTV Cameras : An Interview for Fact or Fictional Show : Revision 3!
http://zeroknock.blogspot.com/2013/08/cctv-cameras-interview-for-fact-and.html
This tangential research relates to my avocation. Sunday, August 25, 2013. CCTV Cameras : An Interview for Fact or Fictional Show : Revision 3! Recently, I did an interesting interview with Veronica from Fact or Fictional show on the Internet. We discussed about the issues and technology behind CCTV cameras. Do not forget to watch the movie on this topic- "Closed Circuit"! Starring Eric Bana and Rebecca Hall. Source: http:/ www.imdb.com/title/tt2218003/. Posted by Aditya K Sood. Chrome XSS Auditor Bypass.
zeroknock.blogspot.com
Pentester's Blog: C-SCAD Tool Presentation and Tool Available
http://zeroknock.blogspot.com/2014/08/c-scad-tool-presentation-and-tool.html
This tangential research relates to my avocation. Friday, August 08, 2014. C-SCAD Tool Presentation and Tool Available. The project page of C-SCAD tool has been updated. Please check the details here: http:/ cscad.secniche.org. BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Client (Penetration Testing). From Aditya K Sood. Posted by Aditya K Sood. Http:/ www.sqiar.com. Tuesday, December 22, 2015 at 3:55:00 AM PST. Security Researcher and Consultant. Chrome XSS Auditor Bypass.
zeroknock.blogspot.com
Pentester's Blog: ToorCon 14 (2012) : Malandroid - The Crux of Android Infections
http://zeroknock.blogspot.com/2013/05/toorcon-14-2012-malandroid-crux-of.html
This tangential research relates to my avocation. Saturday, May 04, 2013. ToorCon 14 (2012) : Malandroid - The Crux of Android Infections. Talk that I gave on Android malware at Toorcon 14. Posted by Aditya K Sood. Good post.thanks for sharing. very useful for me i will bookmark this for my future needs. Thanks. Monday, June 22, 2015 at 4:03:00 AM PDT. Great article with excellent idea! I appreciate your post. Thursday, September 3, 2015 at 9:57:00 PM PDT. Great article with excellent idea!
zeroknock.blogspot.com
Pentester's Blog: May 2013
http://zeroknock.blogspot.com/2013_05_01_archive.html
This tangential research relates to my avocation. Monday, May 20, 2013. Contrarisk Security Podcast Series: A Talk on Socioware! I recently did a podcast on the Socioware with Steve from Contrarisk. Listen to the podcast here: http:/ contrarisk.com/2013/05/19/csp-0011/. Posted by Aditya K Sood. Saturday, May 04, 2013. ToorCon 14 (2012) : Malandroid - The Crux of Android Infections. Talk that I gave on Android malware at Toorcon 14. Posted by Aditya K Sood. Security Researcher and Consultant.
zeroknock.blogspot.com
Pentester's Blog: Internal IP Address Disclosure over HTTP Protocol Channel : Information Revealing Headers !
http://zeroknock.blogspot.com/2013/07/internal-ip-address-disclosure-over.html
This tangential research relates to my avocation. Wednesday, July 17, 2013. Internal IP Address Disclosure over HTTP Protocol Channel : Information Revealing Headers! You can read more about HTTP 1.1 specifications and working here: http:/ www.w3.org/Protocols/rfc2616/rfc2616-sec14.html. 1 Location Response-Header Field:. There is a difference between in the usage of Location and Content-Location HTTP response headers. For reference, you can read this blog entry: http:/ www.subbu.org/blog/200...This HTTP...
zeroknock.blogspot.com
Pentester's Blog: Reported Jenkins Vulnerability Patched by BlackBerry !
http://zeroknock.blogspot.com/2014/01/reported-jenkins-bug-patched-by.html
This tangential research relates to my avocation. Wednesday, January 01, 2014. Reported Jenkins Vulnerability Patched by BlackBerry! A couple of months ago, I discussed about the existence of configuration flaws in deployment of Jenkins software management application. The details are presented here: Jenkins Configuration Issues. Which is fine as long as the team eradicates the vulnerability. I always believe that it is important to understand the cons associated with that existing vulnerability when it ...
zeroknock.blogspot.com
Pentester's Blog: Code Nuances (or Bypassing XSS Filters) : Centralops.net Case Study
http://zeroknock.blogspot.com/2014/01/code-nuances-or-bypassing-xss-filters.html
This tangential research relates to my avocation. Tuesday, January 07, 2014. Code Nuances (or Bypassing XSS Filters) : Centralops.net Case Study. It is always fun to play around with deployed security mechanisms that are used for subverting application layer attacks. It is much more interesting to target applications enabled with protections (or that throw code nuances) rather attacking protection-free applications. A simple case study of centralops.net is presented below. Error due to Injection! The sup...
zeroknock.blogspot.com
Pentester's Blog: August 2014
http://zeroknock.blogspot.com/2014_08_01_archive.html
This tangential research relates to my avocation. Friday, August 08, 2014. C-SCAD Tool Presentation and Tool Available. The project page of C-SCAD tool has been updated. Please check the details here: http:/ cscad.secniche.org. BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Client (Penetration Testing). From Aditya K Sood. Posted by Aditya K Sood. Security Researcher and Consultant. C-SCAD Tool Presentation and Tool Available. Chrome XSS Auditor Bypass. XSS in centralops.net.
secniche.org
SecNiche Security Labs - /root@labs:~#
http://www.secniche.org/index.html
SecNiche Security Labs - /root@labs: #. Fetch the BlackHat 2014 Briefing Research Presentation and Paper: BlackHat-2014. C-SCAD - Assessing Security Flaws in ClearSCADA Web-X Client. Sparty - Analyzing Security Flaws in MS Sharepoint. Declarative Security in HTTP Response Headers - Mozilla Addons. Malware at Stake - Inside the Malicious World. VxWorks OS and Firmware - Holistic Study of Security Model and Vulnerabilities. WAZ v(1.0): Windows Anti Zomb Killer. Last Updated: February 28, 2014.