s.com | GSM: +49 171 7402062
Wrangelstrasse 4 | PGP: A740 DE51 9891 19DF 0D05
10997 Berlin, Germany | 13B3 1759 C388 C92D 6BBB
HRB 105213 B, Amtsgericht Charlottenburg, GF Felix Lindner
___
Full-Disclosure - We believe in it.
Hi,
On Mon, 22 Jan 2007 07:37:29 +0200
"Roni Bachar" <[EMAIL PROTECTED]> wrote:
> The vulnerability can be exploited by doing the following stages:
>
> Sending a post request as followed:
>
> POST https://serverip/sre/params.php HTTP/1.1
> Content-Type: application/x-www-form-urlencoded
> User-A
Hi,
On Thu, 16 Mar 2006 09:48:07 -0500
Simon Smith <[EMAIL PROTECTED]> wrote:
> My first thought was on how to harden the
> authentication because the basic auth didn't cut it for me. Thats what I
> am looking for ideas for.
you may be looking for Digest Authentication:
http://www.ietf.org/rfc/rf
On Fri, 23 Sep 2005 09:54:00 -0300
Leandro Meiners <[EMAIL PROTECTED]> wrote:
> Does anyone know the security contact for SAP, more precisely SAP WAS?
Try [EMAIL PROTECTED], it works.
cheers
Felix
___
Full-Disclosure - We believe in it.
Charter: http://
es by identifying
callers of interesting functions with user provided data in closed source
applications.
Download link: http://www.nruns.com/contentarchiv/de/nbug.zip
regards,
Felix Lindner
--
Felix Lindner, CISSP | Senior Security Consultant, n.runs GmbH
[EMAIL PROTECTED] | +49 (0)171 7