TiTrias Blog

Stay up to date with our new posts
Ultimate Sorting Algorithms Comparison

Ultimate Sorting Algorithms Comparison

Before the stats, You must already know what is Merge sort, Selection Sort, Insertion Sort, Bubble Sort, Quick Sort, Arrays, how to get current time.   What is Stable Sorting ? A sorting algorithm is said to be stable if and only if two records R and S with the...

White Hat Hacking : Apple open redirect vulnerability

White Hat Hacking : Apple open redirect vulnerability

What is Open Redirect vulnerability? Open redirect vulnerabilities allow the attacker to use a well known website name to redirect the visitor to another website. As mentioned in Everything is vulnerable ( Q4 in internet wars ). You should pay attention to URLs you...

Top 10 April fools’ day pranks 2015

Top 10 April fools’ day pranks 2015

Motorola : Selfie Stick  Ok, handcrafted selfie sticks aren’t a thing. But a Moto X with real wood or genuine leather is. Customize yours with natural materials or endless colorful hues — even take the perfect selfie using your voice. Build yours on Moto Maker today....

Everything is vulnerable II : Internet wars

Everything is vulnerable II : Internet wars

Q1. Why was this post written ? This post is highly recommended for all web surfers regardless of their interests; from online shoppers to social networks users. Millions of defrauding are attempted every day and actually many succeed! As a matter of fact, if you have...

Everything is vulnerable : Introduction

Everything is vulnerable : Introduction

“Everything is vulnerable” is a series of posts about computer vulnerabilities, malwares, hacking and security. There is one fact to Illustrate and one goal to reach. The fact : Everything is vulnerable. The goal : Everything can be secured ! This series contains a...

White Hat Hacking : Microsoft XSS & malicious payloads

White Hat Hacking : Microsoft XSS & malicious payloads

This vulnerability allows sending malicious files to a 3rd party using Microsoft AFKAR ( Arabic word for ideas ) service.. Proof of concept 1- Use a binary code or interpretted code for 'callback' parameter value ( Like the python code used in the example ). Or HTML...

White Hat Hacking : AT&T solr admin panel bypassing.

White Hat Hacking : AT&T solr admin panel bypassing.

I can't upload this vulnerability video as It contains sensitive data about AT&T server. ( Local paths,  Linux usernames, etc ) Vulnerability details. Vulnerability detection. AT&T are using Apache Solr for ajax searching in help files querying. Apache solr is...