877.791.9571 |

About the Author:

Dame Jovanoski is a freelance web developer with an immense enthusiasm in computer security. He has recently been an Openlab Student in CERN working in a project connected with web security. He has been interested in computer security since high school and for the time being he is a researcher/contributor for InfoSec institute. He is also a member of Zero Science Lab, Macedonian company for research and developing web and desktop application exploits.
xml-vulnerability

XML vulnerabilities

1. Introduction

As we know, today’s web technology advances are fast in good and bad ways. With almost every technology, if not used properly, its results might be devastating. Many […]

Owasp-Zap-03222013

Which weapon should I choose for Web Penetration Testing? 3.0

Introduction

So here we are on the third edition of “Which weapon should I choose for Web Penetration Testing?” For this edition, I am going to take a walk through […]

WhichWeapon-02152013

Which Weapon Should I Choose for Web Penetration Testing? 2.0

Introduction

This is the second edition of “Which weapon should I choose for Web Penetration Testing?” I hope that you liked the first edition. The same rule applies to this […]

PenTesting-Tools-sized

Which Weapon Should I Choose for Web Penetration Testing? – First Edition

Introduction

Here is the first edition of my selection of penetration testing tools for web applications. There will be more editions of this topic so if you have a tool […]

CrossSiteScriptingwChef-sized

Cross-Site Scripting with ChEF – A Newbie Guide

Introduction

In this article I am going to explain about how you can use Cross-Site Scripting (XSS) vulnerability and how to exploit it in order to cause massive damage. Nah […]

crime scene

Investigating the Crime Scene Part 2: Recovering Files with Autopsy

For part one of this series, please click here.

Introduction

So, in the previous part we saw how we can set up the environment for finding clues and also how to […]

crime scene

Investigating the Crime Scene, Part 1: A Brief Introduction to Computer Forensics and Autopsy

Recommended reading

http://www.thestudymaterial.com/presentation-seminar/computer-presentation/239-computer-forensics-presentation.html?showall=1

First Responder’s Guide to Computer Forensics – CERT (search for it on Google)

Introduction

Sometimes out of curiosity you might happen to hack a government computer, and as the adrenaline […]

ammyy-admin-connected-to-remote-computer

Raising a Rogue Access Point

Introduction

Before beginning this article I want to clear up some stuff about awareness. Everything that is going to be described in this article must be used only for educational […]

padlock

Bypassing SEH Protection: A Real-Life Example

Recommended Reading

Before starting any kind of exploiting, if you are not familiar with buffer overflow, assembler, or how the operating system works, I strongly recommend reading the content from […]