Profile cover photo
Profile photo
Gerasimos Kassaras
Knowledge is free
Knowledge is free
About
Gerasimos's posts

Post has attachment
PHP Source Code Chunks of Insanity (Logins Pages) Part 1
Intro  This post is going to talk about source code reviewing PHP and demonstrate how a relatively small chunk of code can cause you lots of problems. The Code In this article we are going to analyze the code displayed below. The code displayed below might ...

Post has attachment
PHP Source Code Chunks of Insanity (Logout Pages) Part 2
Intro  This post is going to talk about source code reviewing PHP and demonstrate how a relatively small chunk of code can cause you lots of problems. The Code In this article we are going to analyze the code displayed below. The code displayed below might ...

Post has attachment
PHP Source Code Chunks of Insanity (Post Pages) Part 3
Intro  This post is going to talk about source code reviewing PHP and demonstrate how a relatively small chunk of code can cause you lots of problems. The Code In this article we are going to analyze the code displayed below. The code displayed below might ...

Post has attachment
PHP Source Code Chunks of Insanity (Delete Post Pages) Part 4
Intro  This post is going to talk about source code reviewing PHP and demonstrate how a relatively small chunk of code can cause you lots of problems. The Code In this article we are going to analyze the code displayed below. The code displayed below might ...

Post has attachment
The Hackers Guide To Dismantling IPhone (Part 4)
Introduction This blog post is going to talk on how to extract information from an iPhone that is either stolen or compromised. It should be a new article since I am putting some material that is relatively new to me too. So the first think to do in order t...

Post has attachment

Post has attachment
Obfuscate SQL Fuzzing for fun and profit
Introduction Now days cyber criminals are increasingly using automated SQL injection attacks powered by botnets to hit vulnerable systems. SQL injection attacks is the prevalent way of attacking front-end Web applications and back-end databases to compromis...

Post has attachment
Mastering Web Penetration Testing with Python
 Mastering Web Penetration Testing with Python First of all I would like to thank all the readers of this blog and also to inform you that even through I have a long preriod of time to post a new article, I managed to finish my 420 pages book dedicated on W...

Post has attachment
dtpscan
#!/usr/bin/env bash # DTP Scan # Daniel Compton # www.commonexploits.com # contact@commexploits.com # Twitter = @commonexploits # 13/10/2013 # Requires tshark # Tested on Bactrack 5 and Kali with Cisco devices # Version 1.3 - soon will be integrated into Fr...

Post has attachment
**
#!/usr/bin/env bash # Sonicwall config decoder and password extractor for John the Ripper # Daniel Compton # www.commonexploits.com # contact@commexploits.com # Twitter = @commonexploits # 25/10/2013 # Tested on Bactrack 5 & Kali # decodes Sonwicwall base4 ...
Wait while more posts are being loaded