Penetration Testing
Re: Info about attack trees May 25 2012 08:13AM
Federico De Meo (demeof gmail com)
Thank you very much. You give me some interesting starting points.
Hope this can lead me to something :)

I have a question about the "Exploiting software" book. I made a search and
found on amazon "Exploiting software how to break code" by Greg Hoglund and Gary McGraw
is it the correct one? I would like to be sure and not buying random books :)

What about some famous "old" attacks? I know that a lot of attacks were performed
in the past to web application (like what lulzsec did) however I never found any report \ information about
how they were performed and what they exploited. Just things like "There was a SQLi in the form X which was used to perform the attack". Is there something a bit more detailed?

Again thanks to everyone.

------------------------------
Federico De Meo-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)

iQEcBAEBAgAGBQJPvz8lAAoJEI49NUMLM7fPc+IIAL+g1ju1EtlhIB6b4qVK0HB7
MZhmTzKcJiQr5AJJMFiBDdfu4XE4Ht3hWTNPdRyFZGBbOUBmJz/4EzgbN4wfW1BQ
dNC0Kh76ygnL+4EgxQPLntxLhRekP+sy2mEsre1oSL+Zc4CJooipQizB3MXg9oyH
SXF0lT+Dg5kLXFgrwFwtPgZSWv5z8g8UvMr14EXxARsNZITrZUv8Tj+is62n0YLv
Hzi6lTZf6CfVmGNy8kvMGzmEziGbW9HkWnIsooRhnk/CqNS+yOR1oUx8ZgAcVgTe
tE20TQB+yUNwsWXDpzdtfUPG3i/NuBM4AdxxuVSApeLbGolRuOXAaje5XRHflPk=
=11bm
-----END PGP SIGNATURE-----

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus