Enviar pesquisa
Carregar
Exploiting Version Control Systems
•
2 gostaram
•
5,178 visualizações
Título melhorado com IA
Anant Shrivastava
Seguir
This Demo / talk was focused on exploiting publicly exposed version control system.
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 16
Baixar agora
Baixar para ler offline
Recomendados
Slides null puliya linux basics
Slides null puliya linux basics
Anant Shrivastava
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Anant Shrivastava
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
Android Tamer: Virtual Machine for Android (Security) Professionals
Android Tamer: Virtual Machine for Android (Security) Professionals
Anant Shrivastava
Web Application firewall-Mod security
Web Application firewall-Mod security
Romansh Yadav
Down by the Docker
Down by the Docker
NotSoSecure Global Services
Mod security
Mod security
Shruthi Kamath
Recon
Recon
UTD Computer Security Group
Recomendados
Slides null puliya linux basics
Slides null puliya linux basics
Anant Shrivastava
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Anant Shrivastava
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
Android Tamer: Virtual Machine for Android (Security) Professionals
Android Tamer: Virtual Machine for Android (Security) Professionals
Anant Shrivastava
Web Application firewall-Mod security
Web Application firewall-Mod security
Romansh Yadav
Down by the Docker
Down by the Docker
NotSoSecure Global Services
Mod security
Mod security
Shruthi Kamath
Recon
Recon
UTD Computer Security Group
Apache Struts2 CVE-2017-5638
Apache Struts2 CVE-2017-5638
Riyaz Walikar
Network Security
Network Security
UTD Computer Security Group
Windows Security Crash Course
Windows Security Crash Course
UTD Computer Security Group
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
🏆Ruben Cocheno💭
Ruby and Framework Security
Ruby and Framework Security
Creston Jamison
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
Indonesia Network Operators Group
Nessus Basics
Nessus Basics
amiable_indian
Powershell'in Karanlık Yüzü
Powershell'in Karanlık Yüzü
Halil Dalabasmaz
IPv6 for Pentesters
IPv6 for Pentesters
NotSoSecure Global Services
Ossec Lightning
Ossec Lightning
wremes
Hack wifi password using kali linux
Hack wifi password using kali linux
Helder Oliveira
Aws security with HIDS, OSSEC
Aws security with HIDS, OSSEC
Mayank Gaikwad
IOS Security Basics - NULL/ OWASP/G4H Meet
IOS Security Basics - NULL/ OWASP/G4H Meet
Anthony Jose
nessus
nessus
Muhammad Yasin
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
clevernetsystemsgeneva
How to secure nginx server using fail2ban on Centos-7
How to secure nginx server using fail2ban on Centos-7
Bhadreshsinh Gohil
Isa
Isa
deshvikas
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Michael Boelen
Implementing ossec
Implementing ossec
Jeronimo Zucco
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
Stanfy
My tryst with sourcecode review
My tryst with sourcecode review
Anant Shrivastava
Android Tamer BH USA 2016 : Arsenal Presentation
Android Tamer BH USA 2016 : Arsenal Presentation
Anant Shrivastava
Mais conteúdo relacionado
Mais procurados
Apache Struts2 CVE-2017-5638
Apache Struts2 CVE-2017-5638
Riyaz Walikar
Network Security
Network Security
UTD Computer Security Group
Windows Security Crash Course
Windows Security Crash Course
UTD Computer Security Group
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
🏆Ruben Cocheno💭
Ruby and Framework Security
Ruby and Framework Security
Creston Jamison
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
Indonesia Network Operators Group
Nessus Basics
Nessus Basics
amiable_indian
Powershell'in Karanlık Yüzü
Powershell'in Karanlık Yüzü
Halil Dalabasmaz
IPv6 for Pentesters
IPv6 for Pentesters
NotSoSecure Global Services
Ossec Lightning
Ossec Lightning
wremes
Hack wifi password using kali linux
Hack wifi password using kali linux
Helder Oliveira
Aws security with HIDS, OSSEC
Aws security with HIDS, OSSEC
Mayank Gaikwad
IOS Security Basics - NULL/ OWASP/G4H Meet
IOS Security Basics - NULL/ OWASP/G4H Meet
Anthony Jose
nessus
nessus
Muhammad Yasin
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
clevernetsystemsgeneva
How to secure nginx server using fail2ban on Centos-7
How to secure nginx server using fail2ban on Centos-7
Bhadreshsinh Gohil
Isa
Isa
deshvikas
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Michael Boelen
Implementing ossec
Implementing ossec
Jeronimo Zucco
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
Stanfy
Mais procurados
(20)
Apache Struts2 CVE-2017-5638
Apache Struts2 CVE-2017-5638
Network Security
Network Security
Windows Security Crash Course
Windows Security Crash Course
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
Ruby and Framework Security
Ruby and Framework Security
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
Nessus Basics
Nessus Basics
Powershell'in Karanlık Yüzü
Powershell'in Karanlık Yüzü
IPv6 for Pentesters
IPv6 for Pentesters
Ossec Lightning
Ossec Lightning
Hack wifi password using kali linux
Hack wifi password using kali linux
Aws security with HIDS, OSSEC
Aws security with HIDS, OSSEC
IOS Security Basics - NULL/ OWASP/G4H Meet
IOS Security Basics - NULL/ OWASP/G4H Meet
nessus
nessus
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
How to secure nginx server using fail2ban on Centos-7
How to secure nginx server using fail2ban on Centos-7
Isa
Isa
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Implementing ossec
Implementing ossec
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
Destaque
My tryst with sourcecode review
My tryst with sourcecode review
Anant Shrivastava
Android Tamer BH USA 2016 : Arsenal Presentation
Android Tamer BH USA 2016 : Arsenal Presentation
Anant Shrivastava
Snake bites : Python for Pentesters
Snake bites : Python for Pentesters
Anant Shrivastava
OWASP Bangalore : OWTF demo : 13 Dec 2014
OWASP Bangalore : OWTF demo : 13 Dec 2014
Anant Shrivastava
Tale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learned
Anant Shrivastava
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Anant Shrivastava
Career In Information security
Career In Information security
Anant Shrivastava
Raspberry pi Beginners Session
Raspberry pi Beginners Session
Anant Shrivastava
When the internet bleeded : RootConf 2014
When the internet bleeded : RootConf 2014
Anant Shrivastava
Web2.0 : an introduction
Web2.0 : an introduction
Anant Shrivastava
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
Avr introduction
Avr introduction
Anant Shrivastava
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
Radare2 - An Introduction by Anto Joseph
Radare2 - An Introduction by Anto Joseph
Anthony Jose
Grinder talk
Grinder talk
n|u - The Open Security Community
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
n|u - The Open Security Community
Threat intelligence - nullmeetblr 21st June 2015
Threat intelligence - nullmeetblr 21st June 2015
n|u - The Open Security Community
Csp july2015
Csp july2015
n|u - The Open Security Community
Netcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
Chandrapal Badshah
Destaque
(20)
My tryst with sourcecode review
My tryst with sourcecode review
Android Tamer BH USA 2016 : Arsenal Presentation
Android Tamer BH USA 2016 : Arsenal Presentation
Snake bites : Python for Pentesters
Snake bites : Python for Pentesters
OWASP Bangalore : OWTF demo : 13 Dec 2014
OWASP Bangalore : OWTF demo : 13 Dec 2014
Tale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learned
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Career In Information security
Career In Information security
Raspberry pi Beginners Session
Raspberry pi Beginners Session
When the internet bleeded : RootConf 2014
When the internet bleeded : RootConf 2014
Web2.0 : an introduction
Web2.0 : an introduction
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Avr introduction
Avr introduction
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Radare2 - An Introduction by Anto Joseph
Radare2 - An Introduction by Anto Joseph
Grinder talk
Grinder talk
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Threat intelligence - nullmeetblr 21st June 2015
Threat intelligence - nullmeetblr 21st June 2015
Csp july2015
Csp july2015
Netcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
Semelhante a Exploiting Version Control Systems
Continuous Security
Continuous Security
Sysdig
Swift Install Workshop - OpenStack Conference Spring 2012
Swift Install Workshop - OpenStack Conference Spring 2012
Joe Arnold
Linux
Linux
Kavi Bharathi R
Deploy your Python code on Azure Functions
Deploy your Python code on Azure Functions
Dhilipsiva DS
Assisted-Installer-DevConf-US-2021
Assisted-Installer-DevConf-US-2021
Nir Magnezi
"Look Ma, no hands! Zero Touch Provisioning for OpenShift" DevConf.US 2021
"Look Ma, no hands! Zero Touch Provisioning for OpenShift" DevConf.US 2021
Freddy Rolland
PVS-Studio in the Clouds: Travis CI
PVS-Studio in the Clouds: Travis CI
Andrey Karpov
Rolling upgrade OpenStack
Rolling upgrade OpenStack
Vietnam Open Infrastructure User Group
CI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in Kubernetes
Sysdig
Kali kinux1
Kali kinux1
Mohammad Mafi
Android Boot Time Optimization
Android Boot Time Optimization
Kan-Ru Chen
Baylisa - Dive Into OpenStack
Baylisa - Dive Into OpenStack
Jesse Andrews
Introduction to Docker
Introduction to Docker
Nissan Dookeran
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Ondrej Holecek
Trying and evaluating the new features of GlusterFS 3.5
Trying and evaluating the new features of GlusterFS 3.5
Keisuke Takahashi
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Nicolas Collery
Startup guide for kvm on cent os 6
Startup guide for kvm on cent os 6
Carlos Eduardo
Containerizing your Security Operations Center
Containerizing your Security Operations Center
Jimmy Mesta
Stealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware Analysis
Tamas K Lengyel
Linux sever building
Linux sever building
Edmond Yu
Semelhante a Exploiting Version Control Systems
(20)
Continuous Security
Continuous Security
Swift Install Workshop - OpenStack Conference Spring 2012
Swift Install Workshop - OpenStack Conference Spring 2012
Linux
Linux
Deploy your Python code on Azure Functions
Deploy your Python code on Azure Functions
Assisted-Installer-DevConf-US-2021
Assisted-Installer-DevConf-US-2021
"Look Ma, no hands! Zero Touch Provisioning for OpenShift" DevConf.US 2021
"Look Ma, no hands! Zero Touch Provisioning for OpenShift" DevConf.US 2021
PVS-Studio in the Clouds: Travis CI
PVS-Studio in the Clouds: Travis CI
Rolling upgrade OpenStack
Rolling upgrade OpenStack
CI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in Kubernetes
Kali kinux1
Kali kinux1
Android Boot Time Optimization
Android Boot Time Optimization
Baylisa - Dive Into OpenStack
Baylisa - Dive Into OpenStack
Introduction to Docker
Introduction to Docker
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Uyuni Saltboot - automated image deployment and lifecycle with Uyuni
Trying and evaluating the new features of GlusterFS 3.5
Trying and evaluating the new features of GlusterFS 3.5
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Startup guide for kvm on cent os 6
Startup guide for kvm on cent os 6
Containerizing your Security Operations Center
Containerizing your Security Operations Center
Stealthy, Hypervisor-based Malware Analysis
Stealthy, Hypervisor-based Malware Analysis
Linux sever building
Linux sever building
Mais de Anant Shrivastava
Diverseccon keynote: My 2 Paisa's on Infosec World
Diverseccon keynote: My 2 Paisa's on Infosec World
Anant Shrivastava
WhitePaper : Security issues in android custom rom
WhitePaper : Security issues in android custom rom
Anant Shrivastava
Security Issues in Android Custom ROM
Security Issues in Android Custom ROM
Anant Shrivastava
Web application finger printing - whitepaper
Web application finger printing - whitepaper
Anant Shrivastava
Battle Underground NullCon 2011 Walkthrough
Battle Underground NullCon 2011 Walkthrough
Anant Shrivastava
Nullcon Hack IM 2011 walk through
Nullcon Hack IM 2011 walk through
Anant Shrivastava
Embedded Systems : introduction
Embedded Systems : introduction
Anant Shrivastava
introduction to Lamp Stack
introduction to Lamp Stack
Anant Shrivastava
Logic Families Electronics
Logic Families Electronics
Anant Shrivastava
Filesystem
Filesystem
Anant Shrivastava
basic knowhow hacking
basic knowhow hacking
Anant Shrivastava
Mais de Anant Shrivastava
(11)
Diverseccon keynote: My 2 Paisa's on Infosec World
Diverseccon keynote: My 2 Paisa's on Infosec World
WhitePaper : Security issues in android custom rom
WhitePaper : Security issues in android custom rom
Security Issues in Android Custom ROM
Security Issues in Android Custom ROM
Web application finger printing - whitepaper
Web application finger printing - whitepaper
Battle Underground NullCon 2011 Walkthrough
Battle Underground NullCon 2011 Walkthrough
Nullcon Hack IM 2011 walk through
Nullcon Hack IM 2011 walk through
Embedded Systems : introduction
Embedded Systems : introduction
introduction to Lamp Stack
introduction to Lamp Stack
Logic Families Electronics
Logic Families Electronics
Filesystem
Filesystem
basic knowhow hacking
basic knowhow hacking
Último
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
SeasiaInfotech2
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Último
(20)
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Exploiting Version Control Systems
1.
EXPLOITING VERSION CONTROL SYSTEMS PILLAGING
FOR FUN AND PROFIT BY ANANT SHRIVASTAVA
2.
ANANT SHRIVASTAVA Information Security
Consultant Admin - Dev - Security null + OWASP + G4H and @anantshri Trainer : Blackhat USA, NullCon, g0s, c0c0n, RootConf Speaker : Nullcon, c0c0n, ClubHack, RootConf http://anantshri.info
3.
WHAT IS VCS Version
Control System The hip / developers way of deploying code Supports Auto-Deployment on commit
4.
WHY EXPLOIT Coz its
fun Its like a golden ticket Auto-deployment if available makes it more hip.
5.
VCS 101 Type FOLDER GIT
.git SVN .svn Mercurial .hg
6.
PREDICATABLE FILES .git/HEAD .hg/requires .bzr/README
7.
ROBOTS.TXT OF VCS .gitignore
8.
TOOLS 1. SVN-extractor (Only
SVN) (on top coz i wrote it) 2. DVCS-pillage (lacks SVN support) 3. dvcs-ripper (alternative implementation covers svn too)
9.
DEMO TIME NOTE: ALL
DEMO's are prepared while in sleep deprived state.
10.
DIRECTORY LISTING ENABLED
11.
DIRECTORY LISTING DISABLED
12.
SVN
13.
PHEW DEMO DONE
14.
QUICK CHECKS while read
p; do echo "Input: "$p echo "CHECK: SVN entries http" curl -I echo "CHECK: SVN entries https" curl -k -I echo "CHECK: SVN wcdb" curl -I echo "CHECK: SVN wcdb https" curl -k -I done<$1 http://$p/.svn/entries https://$p/.svn/entries http://$p/.svn/wc.db https://$p/.svn/wc.db
15.
ANY QUESTIONS
16.
ANANT SHRIVASTAVA Information Security
Consultant Admin - Dev - Security null + OWASP + G4H and @anantshri Trainer : Blackhat USA, NullCon, g0s, c0c0n, RootConf Speaker : Nullcon, c0c0n, ClubHack, RootConf http://anantshri.info
Baixar agora