http://forum.darkc0de.com/index.php?action=vthread&forum=19&topic=3778
http://forum.darkc0de.com/index.php?action=vthread&forum=19&topic=8915
http://forum.darkc0de.com/index.php?action=vthread&forum=19&topic=6004
http://nazrek.org/?p=482
http://multimediaforensics.com/mobile-forensics-world-2009-t487.html-sid=502f083c2fcd50878ad3e88fc2344ed5#p1321
http://www.experts-exchange.com/Security/Encryption/Q_22563579.html
http://foro.elhacker.net/nivel_web/xst_cross_site_tracing-t206967.0.html;msg984184
https://www.underground.org.mx/index.php?topic=14833.0;wap
http://www.netsearch-ezine.org/ezines/ns008/ns8-0x0b.txt
https://www.underground.org.mx/index.php?topic=19208.0;wap
http://www.secuobs.com/plugs/11213.shtml
http://en.wikipedia.org/wiki/Cross-site_tracing
http://searchsoftwarequality.techtarget.com/sDefinition/0,,sid92_gci1188707,00.html
http://www.owasp.org/index.php/Cross_Site_Tracing
http://www.codinghorror.com/blog/archives/001175.html
http://sigt.net/archivo/y-mas-fallos-xsrf-xss-para-wordpress.xhtml
http://zer0z0org.blogspot.com/2008/08/metroflog-csrf-xsrf-cross-site-request.html
http://www.owasp.org/index.php/LDAP_injection
http://www.owasp.org/index.php/Testing_for_SSI_Injection_(OWASP-DV-009)
http://www.netsearch-ezine.org/ezines/ns008/ns8-0x0b.txt
http://www.kernelnet.com/content/view/304/2/
http://foros.hackerss.com/t8411/ldap-injection-y-blind-ldap-injection
http://elladodelmal.blogspot.com/2007/10/ldap-injection-blind-ldap-injection.html
http://elladodelmal.blogspot.com/2008/04/jugando-con-ldap-iii-de-iii.html
http://www.netsearch-ezine.org/ezines/ns008/ns8-0x08.txt
http://www.jorgeisaac.com/?p=243
http://argentinasec.blogspot.com/2008/05/inyecciones-sql-bsico-en-cdigos-php_29.html
http://remoteexecution.com/foro/index.php?topic=2204.0
http://foro.elhacker.net/nivel_web/gran_tutorial_sobre_inyecciones_sql_en_mysql-t247535.0.html
http://www.foroswebgratis.com/tema-defacing-91570-729140.htm
http://forum.darkc0de.com/index.php?action=vthread&forum=19&topic=4673
------------------------------------------------------------------------------
http://www.sahw.com/wp/archivos/2008/12/02/analisis-forense-de-memoria-en-sistemas-windows/
http://moyix.blogspot.com/2008/09/window-messages-as-forensic-resource.html
http://ws.hackaholic.org/artigos/WSUpSigF_Shell.txt
http://www.insidepro.com/eng/saminside.shtml
http://foro.el-hacker.com/index.php?topic=139730.0
http://www.lockpickingspain.com/
http://hack0wn.com/forum/index.php?board=22.0
http://www.spanish-hackers.com/
http://bright-shadows.net/
http://forensiczone.blogspot.com/2009/01/using-volatility-1.html
http://blog.didierstevens.com/2006/09/18/a-windows-live-cd-plugin-for-my-userassist-utility/
http://blog.didierstevens.com/programs/userassist/
http://forensiczone.blogspot.com/2007/12/user-assist-data-in-ram-dump.html
http://conexioninversa.blogspot.com/2009/02/forensics-con-volatility.html
http://vidainformatico.blogspot.com/2005/11/como-hackear-hotmailenvenenamiento-arp.html
http://conexioninversa.blogspot.com/2008/12/escuela-de-reciclaje.html
http://conexioninversa.blogspot.com/2008/12/perdidos-en-el-espacio.html
http://www.lifedork.com/sql-injection-google-scanner.html
http://r00tsecurity.org/forums/index.php?showtopic=7627
http://forum.darkc0de.com/index.php?action=vtopic&forum=19&sortBy=0&page=8
http://www.eylion.com/web/content/view/15/2/
Suscribirse a:
Enviar comentarios (Atom)
No hay comentarios:
Publicar un comentario