Description: |
Remote / Local File Inclusion Exploits, API Interception via DLL Redirection, A few of J2EE-based web applications common vulnerabilities, Attacking the Code: Source Code Auditing, IE ActiveX-based 0-days basics Demystified, Basic differences between x86 Assembly and X86-64 Assembly, Vulnerability Enumeration For Penetration Testing, The Website Attack Guide, John The Ripper - An Illustrated Guide, Implementing and Detecting a PCI Rootkit.
|