Data leakage from nic.tm
In an independent project we decided to penetrate some important sites and today we wanna share a small part of what we have done. Today we proudly announce about nic.tm here, it has a vulnerable...
View ArticleYet,another NIC data leakage (NIC.LK)
Nics are most important part of every country on the internet . any unauthorized access can make a disaster to compromised country . for example changing all governments website’s DNS to hacker DNS and...
View ArticleTurning small hole into big access
Most successful attacks start through finding a small and insignificant holes in a system. In another word, the successful attack on the secure system has a notable scenario. I this update I would show...
View ArticleCodedate 2013 CTF write-ups, web100
Recently we took part in Codegate’s CTF. we’ve mostly worked on web section and today I would share what we’ve done. There were 5 web challenges and score points begun from 100 to 500. we (ha.cker.ir +...
View ArticleCodegate 2013 CTF write-up, web500
Web 500 It was such a fantastic challenge and I’ve been absorbed in it. Once you enter the challenge, a message appears that you have to visit this web site by mobile only, so I installed Mozila...
View Articlemagic_quotes filtering evasion ?
Few months ago when I was searching for a piece of code inside of a CMS, I accidentally saw a portal named “Monkey CMS”. It seemed a good but unpopular CMS. Hence, I decided to glance at its source,...
View ArticleMachform form maker – Multiple Vulnerabilities
I want to blog regularly so I decided to publish a vulnerability we’ve found before. Before starting, I would mention that the bug exists on MachForm, a commercial form maker. Further information it...
View ArticleCSAW2013 – Alexander Taylor – (Recon 100 Points)
Picture of Alexander Taylor located at https://ctf.isis.poly.edu/judges/. I’m putting it there for who missed it: In first glance, it had nothing but by more focus, we realized the picture contains...
View Article