#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Sun.com (Oracle Sun Microsystems) vulnerable to SQL Injection

Sun.com (Oracle Sun Microsystems) vulnerable to SQL Injection

Mar 27, 2011
Sun.com (Oracle Sun Microsystems) vulnerable to SQL Injection Sun Microsystems, Inc . was a company selling computers, computer components, computer software, and information technology services. Sun was founded on February 24, 1982. Prior to the acquistition by Oracle its headquarters were in Santa Clara, California (part of Silicon Valley), on the former west campus of the Agnews Developmental Center. On January 27, 2010, Sun was acquired by  Oracle Corporation for US$7.4 billion , based on an agreement signed on April 20, 2009. Sun Microsystems, Inc. was subsequently renamed Oracle America, Inc. (+)  Targets : [-]  www.reman.sun.com [-]  www.ibb.sun.com (+)  Informations : (+) User          : availlist@192.9.170.151 (+) Database : remandb (+) Version     : 5.1.43-log (+) Datadir      : /DATA/5.1_jag/ (+) Other DB   : information_schema (+)  Tables from remandb : [-] files [-] reman_part_list [-] request [-] stk [-] stk2 [-] xoption —————————————— (+)  Columns of xo
694 Israel Mails Hacked By Dinelson Us !

694 Israel Mails Hacked By Dinelson Us !

Mar 27, 2011
694 Israel Mails Hacked By Dinelson Us ! Target :  https://asif-bag.co.il/ Pic :  https:// capitoltransmissionservices. com/capture2.jpg ListMail :  https:// capitoltransmissionservices. com/mails.html Login page :  https://asif-bag.co.il/index. php?susers_login Decrypter Password :  https://www.md5decrypter.co.uk/ Zip :  https:// capitoltransmissionservices. com/mails.zip Tables :  users -  user_perm -  user_2lang -  upload_zip -  upload_shop  News Source : Dinelson Us 
Network Threats: A Step-by-Step Attack Demonstration

Network Threats: A Step-by-Step Attack Demonstration

Apr 25, 2024Endpoint Security / Cyber Security
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zero-day tools that exploit edge-case vulnerabilities. Instead, they often use commonly available tools and exploit multiple vulnerability points. By simulating a real-world network attack, security teams can test their detection systems, ensure they have multiple choke points in place, and demonstrate the value of networking security to leadership. In this article, we demonstrate a real-life attack that could easily occur in many systems. The attack simulation was developed based on the MITRE ATT&CK framework, Atomic Red Team,  Cato Networks ' experience in the field, and public threat intel. In the end, we explain why a holistic secur
MySql.Com Hacked with Blind SQL Injection by Jackh4xor !

MySql.Com Hacked with Blind SQL Injection by Jackh4xor !

Mar 27, 2011
MySql.Com Hacked with Blind SQL Injection by Jackh4xor ! The Mysql website offers database software, services and support for your business, including the Enterprise server, the Network monitoring and advisory services and the production support. The wide range of products include: Mysql clusters, embedded database, drivers for JDBC, ODBC and Net, visual database tools (query browser, migration toolkit) and last but not least the MaxDB- the open source database certified for SAP/R3. The Mysql services are also made available for you. Choose among the Mysql training for database solutions, Mysql certification for the Developers and DBAs, Mysql consulting and support. It makes no difference if you are new in the database technology or a skilled developer of DBA, Mysql proposes services of all sorts for their customers. Vulnerable Target https://mysql.com/customers/view/index.html?id=1170 Host IP 213.136.52.29 Web Server Apache/2.2.15 (Fedora) Powered-by PHP/5.2.13 Injection Typ
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
Powerful message from former C.I.A. Agent to every blogger,hacker and Americans !

Powerful message from former C.I.A. Agent to every blogger,hacker and Americans !

Mar 27, 2011
Powerful message from former C.I.A. Agent to every blogger , hacker and Americans ! News Source :  https://bankofamericasuck.com/
CAT – Web Application Security Test & Assessment Tool

CAT – Web Application Security Test & Assessment Tool

Mar 27, 2011
CAT is designed to facilitate manual web application penetration testing for more complex, demanding application testing tasks. It removes some of the more repetitive elements of the testing process, allowing the tester to focus on individual applications, thus enabling them to conduct a much more thorough test. Conceptually it is similar to other proxies available both commercially and open source, but CAT provides a richer feature set and greater performance, combined with a more intuitive user interface. There are a number of differences between CAT and currently available web proxies. They include: CAT uses Internet Explorer's rendering engine for accurate HTML representation It supports many different types of text conversions including: URL, Base64, Hex, Unicode, HTML/XML, SQL and JavaScript no quotes It offers integrated SQL Injection and XSS Detection Synchronized Proxies for Authentication and Authorisation checking Faster performance due to HTTP connection caching SS
Expert Insights
Cybersecurity Resources