EvilZone
Hacking and Security => Hacking and Security => : gh0st June 24, 2013, 08:46:39 AM
-
anysite containing good info about it?
-
I'd explain what it is, but that'd be way too much of a tautology.
-
btw is not SQL nor XSS :D what is this about sending network packets with malware? is that it? for example in a case like google accounts database how should I start?
-
Strange, you have the word hacker in your profile, but you can't dig for information yourself?
http://en.wikipedia.org/wiki/Arbitrary_code_execution (http://en.wikipedia.org/wiki/Arbitrary_code_execution)
-
Strange, you have the word hacker in your profile, but you can't dig for information yourself?
http://en.wikipedia.org/wiki/Arbitrary_code_execution (http://en.wikipedia.org/wiki/Arbitrary_code_execution)
okay but google accounts is a database right? how do I inject a packet cause as I said earlier is not a URL injection like SQL inection stuff do I port scan it? what I think is that I will need to reverse engieener google account authn. code and try to get something from it but does google account uses that code?
-
okay but google accounts is a database right? how do I inject a packet cause as I said earlier is not a URL injection like SQL inection stuff do I port scan it? what I think is that I will need to reverse engieener google account authn. code and try to get something from it but does google account uses that code?
In this case I say use Google to answer your question.
-
I'd try to help if you knew at least what you meant. Correct me if I'm wrong, but code execution could mean anything.
-
I'd try to help if you knew at least what you meant. Correct me if I'm wrong, but code execution could mean anything.
LOL I said that is not SQL I tho u guys know it here in google vulnerability reward program says that the maximum prize is a remote code execution vulnerability but I guess that it is now :D
-
I would ask have you ever built your own site? Like.. a decent one, not a shitty little script that connects to a mysql database.
If you have, you'll know you're talking absolute garbage, if you haven't, learn the technology before trying to exploit it.
As a tip, if you want to exploit the Google database, at least use their technology... [size=78%]http://research.google.com/archive/bigtable.html (http://research.google.com/archive/bigtable.html)[/size]