Soumettre la recherche
Mettre en ligne
null Pune meet - Application Security: Code injection
•
Télécharger en tant que ODP, PDF
•
0 j'aime
•
2,188 vues
n|u - The Open Security Community
Suivre
null Pune meet - Application Security: Code injection – By Aseem Jakhar http://null.co.in
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 20
Télécharger maintenant
Recommandé
Php 5.6
Php 5.6
Federico Damián Lozada Mosto
Creating own language made easy
Creating own language made easy
Ingvar Stepanyan
SPL, not a bridge too far
SPL, not a bridge too far
Michelangelo van Dam
Linux shell script-1
Linux shell script-1
兎 伊藤
Let's build a parser!
Let's build a parser!
Boy Baukema
Php5 certification mock exams
Php5 certification mock exams
echo liu
Exceptions in PHP
Exceptions in PHP
JanTvrdik
Good Evils In Perl (Yapc Asia)
Good Evils In Perl (Yapc Asia)
Kang-min Liu
Recommandé
Php 5.6
Php 5.6
Federico Damián Lozada Mosto
Creating own language made easy
Creating own language made easy
Ingvar Stepanyan
SPL, not a bridge too far
SPL, not a bridge too far
Michelangelo van Dam
Linux shell script-1
Linux shell script-1
兎 伊藤
Let's build a parser!
Let's build a parser!
Boy Baukema
Php5 certification mock exams
Php5 certification mock exams
echo liu
Exceptions in PHP
Exceptions in PHP
JanTvrdik
Good Evils In Perl (Yapc Asia)
Good Evils In Perl (Yapc Asia)
Kang-min Liu
Intermediate PHP
Intermediate PHP
Bradley Holt
Esprima - What is that
Esprima - What is that
Abhijeet Pawar
PHP Basics
PHP Basics
Henry Osborne
Php Operators N Controllers
Php Operators N Controllers
mussawir20
Perl training-in-navi mumbai
Perl training-in-navi mumbai
vibrantuser
Namespaces
Namespaces
zindadili
Advanced php
Advanced php
Anne Lee
ekb.py - Python VS ...
ekb.py - Python VS ...
it-people
Barely Legal Xxx Perl Presentation
Barely Legal Xxx Perl Presentation
Attila Balazs
Elegant Ways of Handling PHP Errors and Exceptions
Elegant Ways of Handling PHP Errors and Exceptions
ZendCon
Just-In-Time Compiler in PHP 8
Just-In-Time Compiler in PHP 8
Nikita Popov
PerlScripting
PerlScripting
Aureliano Bombarely
PHP7. Game Changer.
PHP7. Game Changer.
Haim Michael
PHP in 2018 - Q4 - AFUP Limoges
PHP in 2018 - Q4 - AFUP Limoges
✅ William Pinaud
PHP Tips for certification - OdW13
PHP Tips for certification - OdW13
julien pauli
Typed Properties and more: What's coming in PHP 7.4?
Typed Properties and more: What's coming in PHP 7.4?
Nikita Popov
Design patterns in javascript
Design patterns in javascript
Abimbola Idowu
DIG1108 Lesson 6
DIG1108 Lesson 6
vc-dig1108-fall-2013
Mirror, mirror on the wall: Building a new PHP reflection library (DPC 2016)
Mirror, mirror on the wall: Building a new PHP reflection library (DPC 2016)
James Titcumb
Data Types In PHP
Data Types In PHP
Mark Niebergall
Code injection
Code injection
Gayatri Patel
Pawel Cygal - SQL Injection and XSS - Basics (Quality Questions Conference)
Pawel Cygal - SQL Injection and XSS - Basics (Quality Questions Conference)
Grand Parade Poland
Contenu connexe
Tendances
Intermediate PHP
Intermediate PHP
Bradley Holt
Esprima - What is that
Esprima - What is that
Abhijeet Pawar
PHP Basics
PHP Basics
Henry Osborne
Php Operators N Controllers
Php Operators N Controllers
mussawir20
Perl training-in-navi mumbai
Perl training-in-navi mumbai
vibrantuser
Namespaces
Namespaces
zindadili
Advanced php
Advanced php
Anne Lee
ekb.py - Python VS ...
ekb.py - Python VS ...
it-people
Barely Legal Xxx Perl Presentation
Barely Legal Xxx Perl Presentation
Attila Balazs
Elegant Ways of Handling PHP Errors and Exceptions
Elegant Ways of Handling PHP Errors and Exceptions
ZendCon
Just-In-Time Compiler in PHP 8
Just-In-Time Compiler in PHP 8
Nikita Popov
PerlScripting
PerlScripting
Aureliano Bombarely
PHP7. Game Changer.
PHP7. Game Changer.
Haim Michael
PHP in 2018 - Q4 - AFUP Limoges
PHP in 2018 - Q4 - AFUP Limoges
✅ William Pinaud
PHP Tips for certification - OdW13
PHP Tips for certification - OdW13
julien pauli
Typed Properties and more: What's coming in PHP 7.4?
Typed Properties and more: What's coming in PHP 7.4?
Nikita Popov
Design patterns in javascript
Design patterns in javascript
Abimbola Idowu
DIG1108 Lesson 6
DIG1108 Lesson 6
vc-dig1108-fall-2013
Mirror, mirror on the wall: Building a new PHP reflection library (DPC 2016)
Mirror, mirror on the wall: Building a new PHP reflection library (DPC 2016)
James Titcumb
Data Types In PHP
Data Types In PHP
Mark Niebergall
Tendances
(20)
Intermediate PHP
Intermediate PHP
Esprima - What is that
Esprima - What is that
PHP Basics
PHP Basics
Php Operators N Controllers
Php Operators N Controllers
Perl training-in-navi mumbai
Perl training-in-navi mumbai
Namespaces
Namespaces
Advanced php
Advanced php
ekb.py - Python VS ...
ekb.py - Python VS ...
Barely Legal Xxx Perl Presentation
Barely Legal Xxx Perl Presentation
Elegant Ways of Handling PHP Errors and Exceptions
Elegant Ways of Handling PHP Errors and Exceptions
Just-In-Time Compiler in PHP 8
Just-In-Time Compiler in PHP 8
PerlScripting
PerlScripting
PHP7. Game Changer.
PHP7. Game Changer.
PHP in 2018 - Q4 - AFUP Limoges
PHP in 2018 - Q4 - AFUP Limoges
PHP Tips for certification - OdW13
PHP Tips for certification - OdW13
Typed Properties and more: What's coming in PHP 7.4?
Typed Properties and more: What's coming in PHP 7.4?
Design patterns in javascript
Design patterns in javascript
DIG1108 Lesson 6
DIG1108 Lesson 6
Mirror, mirror on the wall: Building a new PHP reflection library (DPC 2016)
Mirror, mirror on the wall: Building a new PHP reflection library (DPC 2016)
Data Types In PHP
Data Types In PHP
En vedette
Code injection
Code injection
Gayatri Patel
Pawel Cygal - SQL Injection and XSS - Basics (Quality Questions Conference)
Pawel Cygal - SQL Injection and XSS - Basics (Quality Questions Conference)
Grand Parade Poland
SQL Injections (Part 1)
SQL Injections (Part 1)
n|u - The Open Security Community
Ppt on sql injection
Ppt on sql injection
ashish20012
Sql Injection Myths and Fallacies
Sql Injection Myths and Fallacies
Karwin Software Solutions LLC
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint Presentation
Rapid Purple
En vedette
(6)
Code injection
Code injection
Pawel Cygal - SQL Injection and XSS - Basics (Quality Questions Conference)
Pawel Cygal - SQL Injection and XSS - Basics (Quality Questions Conference)
SQL Injections (Part 1)
SQL Injections (Part 1)
Ppt on sql injection
Ppt on sql injection
Sql Injection Myths and Fallacies
Sql Injection Myths and Fallacies
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint Presentation
Similaire à null Pune meet - Application Security: Code injection
Writing Metasploit Plugins
Writing Metasploit Plugins
amiable_indian
Buffer Overflows
Buffer Overflows
Sumit Kumar
Creating a Fibonacci Generator in Assembly - by Willem van Ketwich
Creating a Fibonacci Generator in Assembly - by Willem van Ketwich
Willem van Ketwich
Shellcoding in linux
Shellcoding in linux
Ajin Abraham
Low Level Exploits
Low Level Exploits
hughpearse
Functuon
Functuon
NithyaNithyav
Functuon
Functuon
NithyaNithyav
Buffer Overflows 101: Some Assembly Required
Buffer Overflows 101: Some Assembly Required
Kory Kyzar
Sending a for ahuh. win32 exploit development old school
Sending a for ahuh. win32 exploit development old school
Nahidul Kibria
04 - I love my OS, he protects me (sometimes, in specific circumstances)
04 - I love my OS, he protects me (sometimes, in specific circumstances)
Alexandre Moneger
Exploiting buffer overflows
Exploiting buffer overflows
Paul Dutot IEng MIET MBCS CITP OSCP CSTM
Buffer Overflow - Smashing the Stack
Buffer Overflow - Smashing the Stack
ironSource
Offensive cyber security: Smashing the stack with Python
Offensive cyber security: Smashing the stack with Python
Malachi Jones
Clean & Typechecked JS
Clean & Typechecked JS
Arthur Puthin
Dive into exploit development
Dive into exploit development
Payampardaz
BASH Shell Scripting – Part III &IV
BASH Shell Scripting – Part III &IV
Zeeshan Iqbal
"Why is there no artificial intelligence yet?" Or, analysis of CNTK tool kit ...
"Why is there no artificial intelligence yet?" Or, analysis of CNTK tool kit ...
PVS-Studio
Format String Exploitation
Format String Exploitation
UTD Computer Security Group
stackconf 2021 | Fuzzing: Finding Your Own Bugs and 0days!
stackconf 2021 | Fuzzing: Finding Your Own Bugs and 0days!
NETWAYS
07 - Bypassing ASLR, or why X^W matters
07 - Bypassing ASLR, or why X^W matters
Alexandre Moneger
Similaire à null Pune meet - Application Security: Code injection
(20)
Writing Metasploit Plugins
Writing Metasploit Plugins
Buffer Overflows
Buffer Overflows
Creating a Fibonacci Generator in Assembly - by Willem van Ketwich
Creating a Fibonacci Generator in Assembly - by Willem van Ketwich
Shellcoding in linux
Shellcoding in linux
Low Level Exploits
Low Level Exploits
Functuon
Functuon
Functuon
Functuon
Buffer Overflows 101: Some Assembly Required
Buffer Overflows 101: Some Assembly Required
Sending a for ahuh. win32 exploit development old school
Sending a for ahuh. win32 exploit development old school
04 - I love my OS, he protects me (sometimes, in specific circumstances)
04 - I love my OS, he protects me (sometimes, in specific circumstances)
Exploiting buffer overflows
Exploiting buffer overflows
Buffer Overflow - Smashing the Stack
Buffer Overflow - Smashing the Stack
Offensive cyber security: Smashing the stack with Python
Offensive cyber security: Smashing the stack with Python
Clean & Typechecked JS
Clean & Typechecked JS
Dive into exploit development
Dive into exploit development
BASH Shell Scripting – Part III &IV
BASH Shell Scripting – Part III &IV
"Why is there no artificial intelligence yet?" Or, analysis of CNTK tool kit ...
"Why is there no artificial intelligence yet?" Or, analysis of CNTK tool kit ...
Format String Exploitation
Format String Exploitation
stackconf 2021 | Fuzzing: Finding Your Own Bugs and 0days!
stackconf 2021 | Fuzzing: Finding Your Own Bugs and 0days!
07 - Bypassing ASLR, or why X^W matters
07 - Bypassing ASLR, or why X^W matters
Plus de n|u - The Open Security Community
Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
Osint primer
Osint primer
n|u - The Open Security Community
SSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
Nmap basics
Nmap basics
n|u - The Open Security Community
Metasploit primary
Metasploit primary
n|u - The Open Security Community
Api security-testing
Api security-testing
n|u - The Open Security Community
Introduction to TLS 1.3
Introduction to TLS 1.3
n|u - The Open Security Community
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
Talking About SSRF,CRLF
Talking About SSRF,CRLF
n|u - The Open Security Community
Building active directory lab for red teaming
Building active directory lab for red teaming
n|u - The Open Security Community
Owning a company through their logs
Owning a company through their logs
n|u - The Open Security Community
Introduction to shodan
Introduction to shodan
n|u - The Open Security Community
Cloud security
Cloud security
n|u - The Open Security Community
Detecting persistence in windows
Detecting persistence in windows
n|u - The Open Security Community
Frida - Objection Tool Usage
Frida - Objection Tool Usage
n|u - The Open Security Community
OSQuery - Monitoring System Process
OSQuery - Monitoring System Process
n|u - The Open Security Community
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
Extensible markup language attacks
Extensible markup language attacks
n|u - The Open Security Community
Linux for hackers
Linux for hackers
n|u - The Open Security Community
Android Pentesting
Android Pentesting
n|u - The Open Security Community
Plus de n|u - The Open Security Community
(20)
Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
Osint primer
Osint primer
SSRF exploit the trust relationship
SSRF exploit the trust relationship
Nmap basics
Nmap basics
Metasploit primary
Metasploit primary
Api security-testing
Api security-testing
Introduction to TLS 1.3
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Talking About SSRF,CRLF
Building active directory lab for red teaming
Building active directory lab for red teaming
Owning a company through their logs
Owning a company through their logs
Introduction to shodan
Introduction to shodan
Cloud security
Cloud security
Detecting persistence in windows
Detecting persistence in windows
Frida - Objection Tool Usage
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks
Extensible markup language attacks
Linux for hackers
Linux for hackers
Android Pentesting
Android Pentesting
Dernier
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Roshan Dwivedi
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Dernier
(20)
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
null Pune meet - Application Security: Code injection
1.
2.
3.
4.
5.
6.
7.
How does the
stack look ?
8.
9.
10.
11.
12.
13.
14.
Demo
15.
16.
17.
Sql Injection
18.
19.
20.
Thank You !
Q A? NULL is looking for phreaks Contact: null@null.co.in
Télécharger maintenant