This document discusses various web application security vulnerabilities including cross-site scripting, SQL injection, and techniques for exploiting them. It provides definitions for reflected, DOM-based, and stored XSS. It also lists different SQL injection techniques like union-based, blind, and time-based SQLi. The document provides examples of these vulnerabilities and asks questions about bypassing protections. It concludes by thanking the reader and providing contact information for the security researcher who authored the document.
This document discusses Memcache injection, which is a technique for injecting malicious code into Memcached servers. It demonstrates how to inject newline characters to overwrite cached values and execute arbitrary commands. It also lists some programming languages and libraries that are vulnerable, as well as content management systems that could be impacted. Safe libraries and updated systems that have addressed this issue are also mentioned. The document aims to raise awareness of this Memcached injection technique and provide information to help secure systems.
Bir Şeyi Hacklemek (DEU ACM Bilişim Günleri 2016)Ömer Çıtak
Ìý
This document outlines a presentation on hacking given by Ömer Çıtak at DEU's 2016 Computer Science Days. The presentation introduces the ADDIE model for designing training and discusses examples of hacking humans, drones, websites, governments, and universities to achieve various targets or results. It concludes by thanking the audience and providing Ömer Çıtak's website and social media information.
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...OWASP Turkiye
Ìý
This document discusses social media forensics on mobile devices. It introduces the topic by noting the large percentage of social media users on mobile and the potential for evidence from mobile devices in investigations. It then outlines the scope of the research, including focusing on Android and iOS operating systems and popular social media apps like Facebook, Twitter, Instagram, and WhatsApp. The document describes the methodology used, including acquiring physical and logical images using tools like XRY and examining evidence using commercial and open source tools. Finally, it provides examples of specific artifacts and evidence found from the various social media apps on both Android and iOS devices.
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...OWASP Turkiye
Ìý
This document discusses social media forensics on mobile devices. It introduces the topic by noting the large percentage of social media users on mobile and the potential for evidence from mobile devices in investigations. It then outlines the scope of the research, including focusing on Android and iOS operating systems and popular social media apps like Facebook, Twitter, Instagram, and WhatsApp. The document describes the methodology used, including acquiring physical and logical images using tools like XRY and examining evidence using commercial and open source tools. Finally, it provides examples of specific artifacts and evidence found from the various social media apps on both Android and iOS devices.
5. HTTP/1.1 ve HTTP/2 Benzerlikleri
diff HTTP/1.1 HTTP/2 (-)
• HTTP metotları
– GET, POST
• Durum kodları
– 200, 404, 500
• Resmi adres sistemi
– URI
• HTTP başlıkları ve çerezler
5
6. HTTP/1.1 ve HTTP/2 Farklılıkları
diff HTTP/1.1 HTTP/2 (>)
• Düzyazı ïƒ Binary
• Sıralı istekler ïƒ Paralel istekler
• Çoklu istekler ïƒ Tek istek
• GZIP ïƒ HPACK
• Ä°stek & cevap ïƒ Sunucudan push özelliÄŸi
6