• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Month: 29.07.2015

Oracle DB vulnerabilities: the missing pentester handbook
Stuff

Oracle DB vulnerabilities: the missing pentester handbook

29.07.201514/10/2015HackMag4071
Today, I would like to discuss the attack vectors used at various stages against the Oracle databases: how to probe the database weaknesses from outside, how to gain a foothold inside and how to automate all this…
CONTINUE READING 🡒
7 non-trivial ways to hack your MySQL Database
Security

7 non-trivial ways to hack your MySQL Database

20.07.201514/10/2015HackMag4801
MySQL is one of the most common database systems. Found everywhere, it is most likely to be used by numerous websites. Hence the reason why the security of this database is a very important issue. An attacker…
CONTINUE READING 🡒
Dive into exceptions: caution, this may be hard
Stuff

Dive into exceptions: caution, this may be hard

15.07.201514/10/2015HackMag5312
Modern versions of OS impose security-based restrictions on executable code. In this context, the use of exception-handling mechanism in injected code or, say, in the manually projected image may become a non-trivial task, that is, if you…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com