Dame Jovanoski

Dame Jovanoski is a freelance web developer with an immense enthusiasm in computer security. He has recently been an Openlab Student in CERN working in a project connected with web security. He has been interested in computer security since high school and for the time being he is a researcher/contributor for InfoSec institute. He is also a member of Zero Science Lab, Macedonian company for research and developing web and desktop application exploits.
Dame Jovanoski

XML vulnerabilities

1. Introduction As we know, today's web technology advances are fast in good and bad ways. With almost every technology, if not used properly, its results mi

Which weapon should I choose for Web Penetration Testing? 3.0

Introduction So here we are on the third edition of "Which weapon should I choose for Web Penetration Testing?" For this edition, I am going to take a walk t

Which Weapon Should I Choose for Web Penetration Testing? 2.0

Introduction This is the second edition of "Which weapon should I choose for Web Penetration Testing?" I hope that you liked the first edition. The same r

Cross-Site Scripting with ChEF – A Newbie Guide

Introduction In this article I am going to explain about how you can use Cross-Site Scripting (XSS) vulnerability and how to exploit it in order to cause ma

Investigating the crime scene part 2: Recovering files with autopsy

For part one of this series, please click here. So, in the previous part we saw how we can set up the environment for finding clues and also how to set up A

Investigating the Crime Scene, Part 1: A Brief Introduction to Computer Forensics and Autopsy

Recommended reading http://www.thestudymaterial.com/presentation-seminar/computer-presentation/239-computer-forensics-presentation.html?showall=1 First Re

Raising a Rogue Access Point

Introduction Before beginning this article I want to clear up some stuff about awareness. Everything that is going to be described in this article must be

Bypassing SEH Protection: A Real-Life Example

Recommended Reading Before starting any kind of exploiting, if you are not familiar with buffer overflow, assembler, or how the operating system works, I str