Quantcast
Channel: Comments for Man Vs WebApp
Browsing latest articles
Browse All 62 View Live

Comment on DNS Attack Takes Down Google Morocco by HF Export

It is hard to know what it takes to protect a server attacks … Here we speak of DNS attacks, but there are so many other … In any case when addressing Google does not last long, the servers have the...

View Article



Comment on Security B-Sides Vegas 2011 Review: How to Hide Your Pr0n by Josh...

Thanks for the write-up on our talk at BSidesLV. I have very similar issues with the governments abuse of power and that was one of the reasons why we wrote Stegg0 to begin with. At the end of your...

View Article

Image may be NSFW.
Clik here to view.

Comment on Web Hacking Survival Kit (News Sources) by Chook

Nice site, and lots of info that will keep me reading for hours

View Article

Comment on Surviving the Week 6/8/2012 by Port80 Software

It’s good to see someone mentioning that users not only change their LinkedIn password, but also change it for any account that uses the same password, or even a similar password. It’s also important...

View Article

Comment on The Sierra Network (ImagiNation) – Lives again by J.R. Holland

Dan – Do you still play on Inn Revival? I just downloaded the client from your blog and am interested in knowing if anyone is still playing. I’m doubting it, but who knows?!? Send me an e-mail at the...

View Article


Comment on Web Hacking Survival Kit (Pentesting Tools) by mbati

Would like an online training on ethical hacking

View Article

Comment on The Sierra Network (ImagiNation) – Lives again by M Flynn

Hi I just started playing this and am just having a blast. I used to play this way back when and even was a beta tester.

View Article

Comment on OWASP Top 10 List Maturing – Evidenced by Minor Changes by Jessica...

” Developers have long used shared libraries and open source code, and oftentimes these components have vulnerabilities that affect the software built with them.” I’m glad this is on the list as well....

View Article


Comment on Four Reasons Security Teams Can’t Stop SQL Injection...

“They simply don’t have the staff, time or technology to dedicate to fixing every vulnerability.” Great point. Sometimes teams have to make decisions and categorize vulnerabilities because they just...

View Article


Comment on WAF != Firewall by Alejandro

Hi Dan, very informative article you made here. You earned a new follower. Cheers!

View Article

Comment on Payback on Web Attackers: Web Honeypots (OWASP AppSecUSA...

Thanks for the post ☺ Yeah, web honeypots is an interesting topic and a lot of work to be done! We plan to release our project soon. Will keep you posted! Sincerely, SRF

View Article

Comment on Payback on Web Attackers: Web Honeypots (OWASP AppSecUSA...

Great! Looking forward to hearing your updates.

View Article

Comment on Chinese Corporate Cyber Espionage by Christopher R. Lew Ph.D by...

The most likely reasons for a possible US vs China war could be a US invasion of North Korea or an escalation of the Taiwan dispute. A war of such nature would be fought in the Pacific, which would be...

View Article


Comment on HO-FFL 2013 Wrap up by Josh Sokol

Next year I want in. 😉 ~josh

View Article

Comment on Are You Ready for Some (Fantasy) Football? by jhaddix

sad i missed out on such an epic sounding league!

View Article


Comment on HOFFL 2014 Playoffs Week 2 by alan shimel

OK Dan I have made some last minute roster pickups like a championship manager should. I wish you luck but am feeling really good about my chances. My team has been practicing well all week 😉 Speak to...

View Article

Comment on Dev by mita

hi, Podpress doesnt work anymore on my updated wordpress. Cant load new podcasts and also cant create other posts/pages without deactivating podpress. What to do pls? Any other suggestions for podcast...

View Article


Comment on An Information Security Place Podcast – Episode 01 for 2012 –...

Thanks for your note about building surceity into the product. Too often surceity is thought of too late in the development process.Your final point about track them till closure – just because the...

View Article

Comment on PHP Security and the Month of PHP Bugs by Dimas

A couple of notes, sainzite your request variables before pulling data directing into you code. Avoid using double quote for simple string echo as it is extra load on php parsing use single quote...

View Article

Comment on WAF != Firewall by Jean

Thanks, Dan. I drew the conclusion bcseuae of where I found the report was hosted; can you elaborate on any relationship other than employer-employee with NT OBJECTives and Larry?

View Article

Comment on WAF != Firewall by marcus apostos

Far better article here: https://www.sans.org/security-resources/idfaq/ips-web-app-firewall.php

View Article


Image may be NSFW.
Clik here to view.

Comment on Man vs WebApp Podcast – Episode 01 – Welcome To The Show by Jess...

Linter – you’re thinking of a linter… code correctness tool… the competitor to Metasploit is Core Impact… I’ve been doing this for over about 8 years now… before that, 20 years in software development

View Article


Comment on This Blog lives again! by lauMarot

nice to read ! You should also migrate your Twitter button wich still leads to NTObjectives

View Article

Comment on This Blog lives again! by ajay

Really learnt few things from this blog, Nice to see coming back again, please have more articles on testing web services . Good luck, Thanks,Aj

View Article

Comment on Web Hacking Survival Kit (Pentesting Tools) by Sunday Philemon

Cool!!

View Article

Browsing latest articles
Browse All 62 View Live


Latest Images