Kislaybhardwaj - kislaybhardwaj.com

General Information:

Latest News:

Malware Analysis - Part 1 26 Oct 2012 | 12:18 am

Malware Analysis: I hope I don't need to explain the definintion of malware and it's analysis if you don't know about malwares then with respect please take a leave and come back after sometime. Mal...

Malware Analysis - Part 1 26 Oct 2012 | 12:18 am

Malware Analysis: I hope I don't need to explain the definintion of malware and it's analysis if you don't know about malwares then with respect please take a leave and come back after sometime. Mal...

How to: Create an Android app for stealing User Info 1 May 2012 | 08:55 pm

Hi I would like to share some stuff about Android security , and I will try to give you some examples , how actually you can create an application without using or adding any permission including and...

How to: Create an Android app for stealing User Info 1 May 2012 | 01:55 pm

Hi I would like to share some stuff about Android security , and I will try to give you some examples , how actually you can create an application without using or adding any permission including and...

SQLi DoS script for SQL injection vulnerability 1 May 2012 | 09:18 am

Today I present a script before you which can DoS a SQL injection vulnerable site. It is coded in perl. I hope you understand how it works. Here it is: #!/usr/bin/perl -w # # SQLidoom.pl # By .....

Exploit writing: A basic Idea. 1 May 2012 | 08:59 am

Exploit Writing Made Easier With !pvefindaddr A few notes before we begin, covering what this paper is about and what it isn’t about: 1. This paper is intended to demonstrate the efficiency of !pvef...

SQLi DoS script for SQL injection vulnerability 1 May 2012 | 05:18 am

Today I present a script before you which can DoS a SQL injection vulnerable site. It is coded in perl. I hope you understand how it works. Here it is: #!/usr/bin/perl -w # # SQLidoom.pl # By .....

Exploit writing: A basic Idea. 1 May 2012 | 04:59 am

Exploit Writing Made Easier With !pvefindaddr A few notes before we begin, covering what this paper is about and what it isn’t about: 1. This paper is intended to demonstrate the efficiency of !pvef...

Aggressive Mode VPN -- IKE-Scan, PSK-Crack, and Cain 30 Apr 2012 | 08:50 pm

In IKE Aggressive mode the authentication hash based on a preshared key (PSK) is transmitted as response to the initial packet of a vpn client that wants to establish an IPSec Tunnel (Hash_R). This ha...

Lets Get Real... 30 Apr 2012 | 08:24 pm

We work in a variety of large environments, networks from 30k hosts up to 100k hosts and like many of you one of our jobs is to provide security advice to our customers. In the infosec industry many t...

Recently parsed news:

Recent searches: