RSS
 

How to get overall CPU utilization from the bash command line (Linux)

27 Nov 2015

For a little project I worked on I needed to get the CPU utilization as a percentage. I Google’d the issue and searched for “cpu utilization bash“. To my surprise there were no elegant solutions. Most just failed to work (on my machine anyway) while others were very inaccurate. For example, some would show the same number…read more.

 
No Comments

Posted in Linux

 

How to get an A+ on Qualy’s SSL Labs Server Test (Apache)

27 Nov 2015

The SSL Server Test by Qualy’s SSL Labs is an easy way to determine how secure your SSL set up actually is. You can run the test at: https://www.ssllabs.com/ssltest/ This is the score for this domain/server:   How to get an A+ score on an Apache HTTP server The default Apache configuration for websites running HTTPs leaves your…read more.

 
No Comments

Posted in Server Management

 

Simple Buffer Overflow Example

23 Nov 2015

I’m posting this example because the current buffer overflow examples on the web are not that good. This is a step by step guide to how to exploit a program that is vulnerable to a buffer overflow attack. The Code

This is the vulnerable code that we will be attacking. In this case, the…read more.

 
No Comments

Posted in Exploitation

 

Finland MSN XSS Vulnerability

08 Sep 2014

The search bar on this page fails to encode the quotes (“) and as a result a onMouseOver event tag can be attached to the search bar which allows an XSS attack to occur. Code:

 

 
No Comments

Posted in News

 

CSE.UNSW.EDU.AU XSS Vulnerability

08 Sep 2014

The staff search page does not sanitise the input of the ID field allowing an XSS attack to be executed.     Code:

 

 
No Comments

Posted in XSS

 

Mashable XSS Vulnerability

08 Sep 2014

The Mashable subscription script fails to sanitise the email field and prints the invalid email on an error page.   Code:

 

 
No Comments

Posted in XSS

 

ABC Mail XSS Vulnerability

08 Sep 2014

The ABC Mail subscription script fails to sanitise the email field or check that a valid email was provided. An attack can easily be executed as the unsanitized “invalid email” is printed on the produced error page. Code:

 
No Comments

Posted in XSS

 

Backlinks.com XSS Vulnerability

03 Sep 2014

The help document search form on Backlinks.com does not correctly sanitise user input allowing an XSS attack to be executed. The follow symbols are converted to to their URL encoded counterparts: ‘<‘, ‘>‘, ‘/‘ Evasion string used (before encoding):  /><script>alert(/XSS/)</script>  

 
No Comments

Posted in XSS

 

NineMSN Flights XSS Vulnerability

10 Nov 2012

After browsing around on the NineMSN website for a little while (for about 10 minutes) I found a XSS vulnerability on a very common page. The NineMSN flights page is located here: http://flights.ninemsn.com.au/ The page did not sanitise input from the depart and return input. The form was expecting a date but any string could…read more.

 
No Comments

Posted in XSS

 

iiNet.net.au XSS Vulnerabilities

06 Oct 2012

iiNet, a major ISP in Australia seems to be a little less secure than they claim they are. After merely searching for XSS vulnerabilities on their website for 5 minutes, I had found these two vulnerabilities. Two non-persistent vulnerabilities, one surprisingly located in iiNet’s main search page. Here is the main search page vulnerability: Code:…read more.

 
No Comments

Posted in XSS

 
Page 5 of 512345