Quantcast
Channel: Comments for Man Vs WebApp
Browsing all 62 articles
Browse latest View live

Comment on HouSecCon 2011 and B-Sides ATL Review by Christian

Yes the shirts are awesome! It was nice meeting you Dan and talking to you and Kim at your booth. For emphasis, the shirt rocks.

View Article



Comment on Announcing SQL Invader by Joe Vernon

Why create yet another tool that will need to be maintained, and will slowly stagnate from lack of attention, and not contribute to an existing and terrific open source project like SQLMap?

View Article

Comment on Announcing SQL Invader by Dan Kuykendall

Hi Joe, We do plan to contribute back to SQLMap and we do use the same database format as SQLMap. To some degree you can think of this as a SQLMap re-write into java, with the addition of a slick...

View Article

Comment on Dropbox (in)security by nxb3942

Dropbox Enterprise File Transfer from Thru is the secure solution for businesses and enterprises. Their solutions have been working for large businesses for ten years without a single security breach....

View Article

Comment on Wine geekery at RSA – a wine tasting reception, NT OBJECTives...

It was a lot of fun, Matt. Let’s do this again sometime.

View Article


Comment on Tales from the Web Scanning Front: Blacklisting by Andre Gironda

“Contact us” pages need to be tested. It is wise to let the application owner know that turning off the mail functionality is the best bet, usually done first in a non-live (i.e. test/staging/dev) site.

View Article

Comment on Tales from the Web Scanning Front: Blacklisting by Dan Kuykendall

Agreed, we didn’t mean to indicate that “Contact us” pages shouldn’t be tested at all. But it is often unwise to run automated scanning against those pages on a production site. Automated testing of...

View Article

Comment on Vegas 2011 Review: How to Hide Your Pr0n by Josh Sokol

Thanks for the write-up on our talk at BSidesLV. I have very similar issues with the governments abuse of power and that was one of the reasons why we wrote Stegg0 to begin with. At the end of your...

View Article


Image may be NSFW.
Clik here to view.

Comment on Web Hacking Survival Kit (News Sources) by Chook

Nice site, and lots of info that will keep me reading for hours

View Article


Comment on Surviving the Week 6/8/2012 by Port80 Software

It’s good to see someone mentioning that users not only change their LinkedIn password, but also change it for any account that uses the same password, or even a similar password. It’s also important...

View Article

Comment on RSA 2012: NT Objectives hosts ISE® VIP wine tasting reception &...

Thanks a lot for your information. I am despretely searching for a RSA course to do but not getting any suitable place. will you plz let me know?

View Article

Comment on Wine geekery at RSA – a wine tasting reception, NT OBJECTives...

Thanks a lot Matthew for such a nice and wonderful presentation. I really appreciate a lot. Keep writing and give us some informative information like this.

View Article

Comment on The Sierra Network (ImagiNation) – Lives again by J.R. Holland

Dan - Do you still play on Inn Revival? I just downloaded the client from your blog and am interested in knowing if anyone is still playing. I’m doubting it, but who knows?!? Send me an e-mail at the...

View Article


Comment on Web Application Security Scanning – The Art of Automation by Andre...

There is only one direction for application security: ethical, whitehat full-knowledge source-code-assisted manual app penetration-testing. The industry decided long ago — just take a look at OWASP...

View Article

Comment on Web Hacking Survival Kit (Pentesting Tools) by mbati

Would like an online training on ethical hacking

View Article


Comment on Payback on Web Attackers: Web Honeypots (OWASP AppSecUSA...

Thanks for the post ☺ Yeah, web honeypots is an interesting topic and a lot of work to be done! We plan to release our project soon. Will keep you posted! Sincerely, SRF

View Article

Comment on Payback on Web Attackers: Web Honeypots (OWASP AppSecUSA...

Great! Looking forward to hearing your updates.

View Article


Comment on Web Application Security Scanning – The Art of Automation by NT...

You are right. no application can work perfectly in all situations. Limiting the potential for human error is critical…as is its requirement.

View Article

Comment on Mobile App Security – Application Security’s “Where’s Waldo” by...

Saying mobile is just like a web app is not accurate. Yes, there are a lot of similar problems you see in web apps (server side JSON, REST, etc. However, mobile application security is probably more...

View Article

Comment on Mobile App Security – Application Security’s “Where’s Waldo” by...

You are correct, that it is more like client server app security, but the main point is that the basic sort of attacks such as SQL injection can still work once inserted into the (JSON, REST, etc)...

View Article
Browsing all 62 articles
Browse latest View live




Latest Images