TiTrias Blog
Stay up to date with our new postsWhite Hat Hacking : Apple open redirect vulnerability
What is Open Redirect vulnerability? Open redirect vulnerabilities allow the attacker to use a well known website name to redirect the visitor to another website. As mentioned in Everything is vulnerable ( Q4 in internet wars ). You should pay attention to URLs you...
White Hat Hacking – RedHat Cross Site Scripting ( XSS )
White Hat Hacking - Redhat cross site scripting ( XSS ) Using an ordinary Cross site scripting payload, The vulnerability could NOT be exploited. However, I tried to put the payload inside a JavaScript file with JPG extension and the trick worked ! Payload :...
Everything is vulnerable II : Internet wars
Q1. Why was this post written ? This post is highly recommended for all web surfers regardless of their interests; from online shoppers to social networks users. Millions of defrauding are attempted every day and actually many succeed! As a matter of fact, if you have...
Everything is vulnerable I : What are Malwares, viruses, exploits, trojans, hacks and cracks ?
Q1. Why was this post written? To define Malwares and demonstrate the differences between Viruses, Trojans and Spams. Also, We will talk a bit about hacks and cracks. Q2. What are Malwares? Malware is a malicious, invisible and harmful piece of software like viruses,...
Everything is vulnerable : Introduction
“Everything is vulnerable” is a series of posts about computer vulnerabilities, malwares, hacking and security. There is one fact to Illustrate and one goal to reach. The fact : Everything is vulnerable. The goal : Everything can be secured ! This series contains a...
White Hat Hacking : Microsoft XSS & malicious payloads
This vulnerability allows sending malicious files to a 3rd party using Microsoft AFKAR ( Arabic word for ideas ) service.. Proof of concept 1- Use a binary code or interpretted code for 'callback' parameter value ( Like the python code used in the example ). Or HTML...
White Hat Hacking : AT&T solr admin panel bypassing.
I can't upload this vulnerability video as It contains sensitive data about AT&T server. ( Local paths, Linux usernames, etc ) Vulnerability details. Vulnerability detection. AT&T are using Apache Solr for ajax searching in help files querying. Apache solr is...
Sorting Algorithms Comparison : Selection Sort Vs Insertion Sort Vs Merge Sort.
UPDATE : Check this more general comparison ( Bubble Sort Vs Selection sort Vs Insertion Sort Vs Merge Sort Vs Merge Sort Vs Quick Sort ) Before the stats, You must already know what is Merge sort, Selection Sort, Insertion Sort, Arrays, how to get current time....