#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Sun.com (Oracle Sun Microsystems) vulnerable to SQL Injection

Sun.com (Oracle Sun Microsystems) vulnerable to SQL Injection

Mar 27, 2011
Sun.com (Oracle Sun Microsystems) vulnerable to SQL Injection Sun Microsystems, Inc . was a company selling computers, computer components, computer software, and information technology services. Sun was founded on February 24, 1982. Prior to the acquistition by Oracle its headquarters were in Santa Clara, California (part of Silicon Valley), on the former west campus of the Agnews Developmental Center. On January 27, 2010, Sun was acquired by  Oracle Corporation for US$7.4 billion , based on an agreement signed on April 20, 2009. Sun Microsystems, Inc. was subsequently renamed Oracle America, Inc. (+)  Targets : [-]  www.reman.sun.com [-]  www.ibb.sun.com (+)  Informations : (+) User          : availlist@192.9.170.151 (+) Database : remandb (+) Version     : 5.1.43-log (+) Datadir      : /DATA/5.1_jag/ (+) Other DB   : information_schema (+)  Tables from remandb : [-] files [-] reman_part_list [-] request [-] stk [-] stk2 [-] xoption —————————————— (+)  Columns of xo
694 Israel Mails Hacked By Dinelson Us !

694 Israel Mails Hacked By Dinelson Us !

Mar 27, 2011
694 Israel Mails Hacked By Dinelson Us ! Target :  https://asif-bag.co.il/ Pic :  https:// capitoltransmissionservices. com/capture2.jpg ListMail :  https:// capitoltransmissionservices. com/mails.html Login page :  https://asif-bag.co.il/index. php?susers_login Decrypter Password :  https://www.md5decrypter.co.uk/ Zip :  https:// capitoltransmissionservices. com/mails.zip Tables :  users -  user_perm -  user_2lang -  upload_zip -  upload_shop  News Source : Dinelson Us 
Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
MySql.Com Hacked with Blind SQL Injection by Jackh4xor !

MySql.Com Hacked with Blind SQL Injection by Jackh4xor !

Mar 27, 2011
MySql.Com Hacked with Blind SQL Injection by Jackh4xor ! The Mysql website offers database software, services and support for your business, including the Enterprise server, the Network monitoring and advisory services and the production support. The wide range of products include: Mysql clusters, embedded database, drivers for JDBC, ODBC and Net, visual database tools (query browser, migration toolkit) and last but not least the MaxDB- the open source database certified for SAP/R3. The Mysql services are also made available for you. Choose among the Mysql training for database solutions, Mysql certification for the Developers and DBAs, Mysql consulting and support. It makes no difference if you are new in the database technology or a skilled developer of DBA, Mysql proposes services of all sorts for their customers. Vulnerable Target https://mysql.com/customers/view/index.html?id=1170 Host IP 213.136.52.29 Web Server Apache/2.2.15 (Fedora) Powered-by PHP/5.2.13 Injection Typ
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
Powerful message from former C.I.A. Agent to every blogger,hacker and Americans !

Powerful message from former C.I.A. Agent to every blogger,hacker and Americans !

Mar 27, 2011
Powerful message from former C.I.A. Agent to every blogger , hacker and Americans ! News Source :  https://bankofamericasuck.com/
CAT – Web Application Security Test & Assessment Tool

CAT – Web Application Security Test & Assessment Tool

Mar 27, 2011
CAT is designed to facilitate manual web application penetration testing for more complex, demanding application testing tasks. It removes some of the more repetitive elements of the testing process, allowing the tester to focus on individual applications, thus enabling them to conduct a much more thorough test. Conceptually it is similar to other proxies available both commercially and open source, but CAT provides a richer feature set and greater performance, combined with a more intuitive user interface. There are a number of differences between CAT and currently available web proxies. They include: CAT uses Internet Explorer's rendering engine for accurate HTML representation It supports many different types of text conversions including: URL, Base64, Hex, Unicode, HTML/XML, SQL and JavaScript no quotes It offers integrated SQL Injection and XSS Detection Synchronized Proxies for Authentication and Authorisation checking Faster performance due to HTTP connection caching SS
Mafia-country.cz.cc & Syriatourism.org Hacked by The 077 ( Hamdi HaCker )

Mafia-country.cz.cc & Syriatourism.org Hacked by The 077 ( Hamdi HaCker )

Mar 27, 2011
Mafia-country.cz.cc & Syriatourism.org Hacked by The 077 ( Hamdi HaCker ) Hacked Sites : Mafia-country.cz.cc Syriatourism.org
Cybersecurity Resources