Good info!!

On Tue, Jan 18, 2011 at 5:57 PM, C0r3 Machin3gun
<[email protected]>wrote:

> "Every year the Web security community produces a stunning amount of new
> hacking techniques published in various white papers, blog posts, magazine
> articles, mailing list emails, etc. Within the thousands of pages are the
> latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond
> individual vulnerability instances with CVE numbers or system compromises,
> we're talking about actual new and creative methods of Web-based attack. Now
> it its fifth year the Top Ten Web Hacking Techniques list encourages
> information sharing, provides a centralized knowledge-base, and recognizes
> researchers who contribute excellent work."
>
>
> http://jeremiahgrossman.blogspot.com/2011/01/top-ten-web-hacking-techniques-of-2010.html
>
> _______________________________________________
> Owasp-Malaysia mailing list
> [email protected]
> https://lists.owasp.org/mailman/listinfo/owasp-malaysia
>
> OWASP Malaysia Wiki
> http://www.owasp.org/index.php/Malaysia
>
> OWASP Malaysia Wiki Facebook
> http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420
>
_______________________________________________
Owasp-Malaysia mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-malaysia

OWASP Malaysia Wiki
http://www.owasp.org/index.php/Malaysia

OWASP Malaysia Wiki Facebook
http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420

Reply via email to