Good info!! On Tue, Jan 18, 2011 at 5:57 PM, C0r3 Machin3gun <[email protected]>wrote:
> "Every year the Web security community produces a stunning amount of new > hacking techniques published in various white papers, blog posts, magazine > articles, mailing list emails, etc. Within the thousands of pages are the > latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond > individual vulnerability instances with CVE numbers or system compromises, > we're talking about actual new and creative methods of Web-based attack. Now > it its fifth year the Top Ten Web Hacking Techniques list encourages > information sharing, provides a centralized knowledge-base, and recognizes > researchers who contribute excellent work." > > > http://jeremiahgrossman.blogspot.com/2011/01/top-ten-web-hacking-techniques-of-2010.html > > _______________________________________________ > Owasp-Malaysia mailing list > [email protected] > https://lists.owasp.org/mailman/listinfo/owasp-malaysia > > OWASP Malaysia Wiki > http://www.owasp.org/index.php/Malaysia > > OWASP Malaysia Wiki Facebook > http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420 >
_______________________________________________ Owasp-Malaysia mailing list [email protected] https://lists.owasp.org/mailman/listinfo/owasp-malaysia OWASP Malaysia Wiki http://www.owasp.org/index.php/Malaysia OWASP Malaysia Wiki Facebook http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420

