#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Sun.com (Oracle Sun Microsystems) vulnerable to SQL Injection

Sun.com (Oracle Sun Microsystems) vulnerable to SQL Injection

Mar 27, 2011
Sun.com (Oracle Sun Microsystems) vulnerable to SQL Injection Sun Microsystems, Inc . was a company selling computers, computer components, computer software, and information technology services. Sun was founded on February 24, 1982. Prior to the acquistition by Oracle its headquarters were in Santa Clara, California (part of Silicon Valley), on the former west campus of the Agnews Developmental Center. On January 27, 2010, Sun was acquired by  Oracle Corporation for US$7.4 billion , based on an agreement signed on April 20, 2009. Sun Microsystems, Inc. was subsequently renamed Oracle America, Inc. (+)  Targets : [-]  www.reman.sun.com [-]  www.ibb.sun.com (+)  Informations : (+) User          : availlist@192.9.170.151 (+) Database : remandb (+) Version     : 5.1.43-log (+) Datadir      : /DATA/5.1_jag/ (+) Other DB   : information_schema (+)  Tables from remandb : [-] files [-] reman_part_list [-] request [-] stk [-] stk2 [-] xoption —————————————— (+)  Columns of xo
694 Israel Mails Hacked By Dinelson Us !

694 Israel Mails Hacked By Dinelson Us !

Mar 27, 2011
694 Israel Mails Hacked By Dinelson Us ! Target :  https://asif-bag.co.il/ Pic :  https:// capitoltransmissionservices. com/capture2.jpg ListMail :  https:// capitoltransmissionservices. com/mails.html Login page :  https://asif-bag.co.il/index. php?susers_login Decrypter Password :  https://www.md5decrypter.co.uk/ Zip :  https:// capitoltransmissionservices. com/mails.zip Tables :  users -  user_perm -  user_2lang -  upload_zip -  upload_shop  News Source : Dinelson Us 
Code Keepers: Mastering Non-Human Identity Management

Code Keepers: Mastering Non-Human Identity Management

Apr 12, 2024DevSecOps / Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard human identities, a pressing question arises: How do we guarantee the security and integrity of these non-human counterparts? How do we authenticate, authorize, and regulate access for entities devoid of life but crucial for the functioning of critical systems? Let's break it down. The challenge Imagine a cloud-native application as a bustling metropolis of tiny neighborhoods known as microservices, all neatly packed into containers. These microservices function akin to diligent worker bees, each diligently performing its designated task, be it processing data, verifying credentials, or
MySql.Com Hacked with Blind SQL Injection by Jackh4xor !

MySql.Com Hacked with Blind SQL Injection by Jackh4xor !

Mar 27, 2011
MySql.Com Hacked with Blind SQL Injection by Jackh4xor ! The Mysql website offers database software, services and support for your business, including the Enterprise server, the Network monitoring and advisory services and the production support. The wide range of products include: Mysql clusters, embedded database, drivers for JDBC, ODBC and Net, visual database tools (query browser, migration toolkit) and last but not least the MaxDB- the open source database certified for SAP/R3. The Mysql services are also made available for you. Choose among the Mysql training for database solutions, Mysql certification for the Developers and DBAs, Mysql consulting and support. It makes no difference if you are new in the database technology or a skilled developer of DBA, Mysql proposes services of all sorts for their customers. Vulnerable Target https://mysql.com/customers/view/index.html?id=1170 Host IP 213.136.52.29 Web Server Apache/2.2.15 (Fedora) Powered-by PHP/5.2.13 Injection Typ
cyber security

WATCH: The SaaS Security Challenge in 90 Seconds

websiteAdaptive ShieldSaaS Security / Cyber Threat
Discover how you can overcome the SaaS security challenge by securing your entire SaaS stack with SSPM.
Powerful message from former C.I.A. Agent to every blogger,hacker and Americans !

Powerful message from former C.I.A. Agent to every blogger,hacker and Americans !

Mar 27, 2011
Powerful message from former C.I.A. Agent to every blogger , hacker and Americans ! News Source :  https://bankofamericasuck.com/
CAT – Web Application Security Test & Assessment Tool

CAT – Web Application Security Test & Assessment Tool

Mar 27, 2011
CAT is designed to facilitate manual web application penetration testing for more complex, demanding application testing tasks. It removes some of the more repetitive elements of the testing process, allowing the tester to focus on individual applications, thus enabling them to conduct a much more thorough test. Conceptually it is similar to other proxies available both commercially and open source, but CAT provides a richer feature set and greater performance, combined with a more intuitive user interface. There are a number of differences between CAT and currently available web proxies. They include: CAT uses Internet Explorer's rendering engine for accurate HTML representation It supports many different types of text conversions including: URL, Base64, Hex, Unicode, HTML/XML, SQL and JavaScript no quotes It offers integrated SQL Injection and XSS Detection Synchronized Proxies for Authentication and Authorisation checking Faster performance due to HTTP connection caching SS
Mafia-country.cz.cc & Syriatourism.org Hacked by The 077 ( Hamdi HaCker )

Mafia-country.cz.cc & Syriatourism.org Hacked by The 077 ( Hamdi HaCker )

Mar 27, 2011
Mafia-country.cz.cc & Syriatourism.org Hacked by The 077 ( Hamdi HaCker ) Hacked Sites : Mafia-country.cz.cc Syriatourism.org
Cybersecurity Resources