TiTrias Blog
Stay up to date with our new postsLinux Best Code (Text) Editor : Atom, Sublime or Visual Studio Code?
Sublime Text I used ST2 in the past. How it works: Getting the job done as simple as possible. ST2 is pretty fast in starting up and in usage in general. Pros : Free for evaluation. Fast load up. Cons : Sublime Text can't be used commercially unless you buy a...
[How To] PouchDB and CouchDB : Database Per User Made Simple
CouchDB is one of the most powerful DBMS nowadays. However, although its documentation is good, there is not enough topics of how-tos and best practices for common use cases. One of these use cases is the database_per_user. Each user has his own private data that only...
Ultimate Sorting Algorithms Comparison
Before the stats, You must already know what is Merge sort, Selection Sort, Insertion Sort, Bubble Sort, Quick Sort, Arrays, how to get current time. What is Stable Sorting ? A sorting algorithm is said to be stable if and only if two records R and S with the...
White Hat Hacking : Apple open redirect vulnerability
What is Open Redirect vulnerability? Open redirect vulnerabilities allow the attacker to use a well known website name to redirect the visitor to another website. As mentioned in Everything is vulnerable ( Q4 in internet wars ). You should pay attention to URLs you...
White Hat Hacking – RedHat Cross Site Scripting ( XSS )
White Hat Hacking - Redhat cross site scripting ( XSS ) Using an ordinary Cross site scripting payload, The vulnerability could NOT be exploited. However, I tried to put the payload inside a JavaScript file with JPG extension and the trick worked ! Payload :...
Top 10 April fools’ day pranks 2015
Motorola : Selfie Stick Ok, handcrafted selfie sticks aren’t a thing. But a Moto X with real wood or genuine leather is. Customize yours with natural materials or endless colorful hues — even take the perfect selfie using your voice. Build yours on Moto Maker today....
Everything is vulnerable II : Internet wars
Q1. Why was this post written ? This post is highly recommended for all web surfers regardless of their interests; from online shoppers to social networks users. Millions of defrauding are attempted every day and actually many succeed! As a matter of fact, if you have...
Everything is vulnerable I : What are Malwares, viruses, exploits, trojans, hacks and cracks ?
Q1. Why was this post written? To define Malwares and demonstrate the differences between Viruses, Trojans and Spams. Also, We will talk a bit about hacks and cracks. Q2. What are Malwares? Malware is a malicious, invisible and harmful piece of software like viruses,...
Everything is vulnerable : Introduction
“Everything is vulnerable” is a series of posts about computer vulnerabilities, malwares, hacking and security. There is one fact to Illustrate and one goal to reach. The fact : Everything is vulnerable. The goal : Everything can be secured ! This series contains a...
White Hat Hacking : Microsoft XSS & malicious payloads
This vulnerability allows sending malicious files to a 3rd party using Microsoft AFKAR ( Arabic word for ideas ) service.. Proof of concept 1- Use a binary code or interpretted code for 'callback' parameter value ( Like the python code used in the example ). Or HTML...
Reface : How Facebook should have been like! [ Chrome Extension ]
Recently, I started to hate the way Facebook shows activity of the world all over the place. Whether through the home page or the silly ticker! I've implemented a small extension to remove parts that I don't like. In my case I removed Ads, ticker, home button &...
White Hat Hacking : AT&T solr admin panel bypassing.
I can't upload this vulnerability video as It contains sensitive data about AT&T server. ( Local paths, Linux usernames, etc ) Vulnerability details. Vulnerability detection. AT&T are using Apache Solr for ajax searching in help files querying. Apache solr is...