XSS Vulnerable Elance.com

21:26 Posted by Ali Hassan Ghori
Elance.com was Vulnerable for XSS , not entire domain but some pages may be Vulnerable in a past few months . An Independent Security Researcher "Ali Hasan Ghauri (AHPT)" has discovered bug on a big website for online jobs (Elance.com) . He Report this issue to the security team of Elance then Security...

An Independent Security Researcher "Ali Hasan Ghauri" has discovered a Cross-Site Scripting Vulnerability on us.acer.com/

11:53 Posted by Ali Hassan Ghori
An Independent Security Researcher "Ali Hasan Ghauri" has discovered a Cross-Site Scripting Vulnerability on us.acer.com/ . General Information Established in 1976 with US$25,000 in capital and 11 employees, Acer today focuses on marketing its brand-name IT products around the globe....

Vulnerability Found On phonecopy.com

20:47 Posted by Ali Hassan Ghori
Phonecopy.com is 7 Years, 10 Months, 3 Days old. It is ranked #167,888 on the world wide web, the lower the rank, the popular the website is . Value of it to be upwards of $83 USD. Phonecopy.com project is currently developed and operated as part of the "Invention Lab" research...

Vulnerability Found On Oarsa.org

20:23 Posted by Ali Hassan Ghori
Oarsa.org is 11 Years, 13 Days old. It is ranked #3,464,478 on the world wide web, the lower the rank, the popular the website is. The website is estimated to earn at least $2 USD per day from advertising revenues and we value it to be upwards of $1,839 USD. oarsa.org was founded...

Vulnerability Found On Resellerratings.com

03:13 Posted by Ali Hassan Ghori
Resellerratings.com is thirteen Years, 9 Months, twenty one Days previous. it's graded #9,043 on the globe wide internet, the lower the rank, the popular the web site is. the web site is calculable to earn a minimum of $341 USD per day from advertising revenues and that we price it to be upwards of...

Vulnerability Found On Thestar.com.my

02:33 Posted by Ali Hassan Ghori
Thestar.com.my is ranked #3,708 on the world wide web, the lower the rank, the popular the website is. The website is estimated to earn at least $978 USD per day from advertising revenues and we value it to be upwards of $714,286 USD. We have found the average page load time to...

Vulnerability Found On Winability.com

20:25 Posted by Ali Hassan Ghori
I found Vulnerability on winability.com , It has atiny low package company, specializing in developing and commercial enterprise helpful Windows utilities and security package. it's initial product was released in August 1993, and It initial electronic computer was up and running within the middle...

Vulnerability Found on braintreepayments.com/

11:46 Posted by Ali Hassan Ghori
Braintree is constructed to be the sole payment platform merchants can ever would like. From startups to heavyweights, and each business between, Braintree adapts. It processed more than 1.5 million ransactions in an exceedingly single day for one among our shoppers, with no disruption to them or the...

Vulnerability Found on Braintreepayments.com

12:12 Posted by Ali Hassan Ghori
Cross Site scripting holes are gaining popularity among hackers as straightforward holes to find in giant websites. Websites from fbi.gov, CNN.com, Time.com, Ebay, Yahoo, Apple pc, Microsoft, Zdnet, Wired, and Newsbytes have all had one type or another of XSS bugs. XSS holes can allow Javascript...

Vulnerability Found On Perrymarshall.com

11:32 Posted by Ali Hassan Ghori
Reflected XSS attacks are also known as non-persistent XSS attacks.. And I found Reflected XSS Vulnerability on  http://www.perrymarshall.com/ ,  The Vulnerability Link is Given Below It was Fixed on (Dec/28/2012) i don't provide screen shot of this vulnerability because of some critical...

Must Read If You really need to become a real hacker:-

00:40 Posted by Ali Hassan Ghori
(-1-) Never trust sites that raise you for cash reciprocally of Hacking Softwares or United Nations agency claim to Hack Email Id’s reciprocally of cash. All such things square measure Scam . Nothing Works. (-2-) There's NO DIRECT software system to Hack Facebook , Google , Yahoo or the other massive web site. All the thusftwares that claim to try to to so square measure scam. they're simply...

Bug Bounty Programs

07:55 Posted by Ali Hassan Ghori
List of Bug Bounty Programs Bug Bounty Program a well known topic is on the heat these days, known companies like: google, Facebook, Mozilla are paying for finding a vulnerabilities on their web servers, products, services or some associated applications. Here is a list for all the Security Researchers and Bug Hunters to target all the best :) Bug Bounty Websites for Web Application VulnerabilityMozilla security@mozilla.org http://www.mozilla.org/security http://www.mozilla.org/projects/security/security-bugs-policy.html http://www.mozilla.org/security/announce Google security@google.com https://www.google.com/appserve/security-bugs/new?rl=xkp7zert49a5q6owod28bhr2 Facebook http://www.facebook.com/whitehat/bounty Paypal sitesecurity@paypal.com https://cms.paypal.com/cgi-bin/marketingweb?cmd=_render-content&content_ID=security/reporting_security_issues Etsy http://www.etsy.com Wordpress http://www.whitefirdesign.com/about/wordpress-security-bug-bounty-program.html Commonsware http://commonsware.com/bounty.html CCBill http://www.ccbill.com/developers/security/vulnerability-reward-program.php http://www.ccbill.com/developers/security/rewards.php Vark http://www.vark.com Windthorstisd http://www.windthorstisd.net/BugReport.cfm Bug...

Bypassing the XSS Filters : Advanced XSS Tutorials for Web application Pen Testing

09:45 Posted by Ali Hassan Ghori
Hi friends, last time, i explained what is XSS and how an attacker can inject malicious script in your site. As i promised earlier, i am writing this advanced XSS tutorial for you(still more articles will come) . Sometimes, website owner use XSS filters(WAF) to protect against XSS vulnerability. For...

Cross Site Scripting(XSS) Complete Tutorial for Beginners~ Web Application Vulnerability

09:39 Posted by Ali Hassan Ghori
What is XSS? Cross Site Scripting also known as XSS , is one of the most common web appliction vulnerability that allows an attacker to run his own client side scripts(especially Javascript) into web pages viewed by other users. In a typical XSS attack, a hacker inject his malicious javascript...

How to Identify and Avoid Phishing Scams

09:06 Posted by Ali Hassan Ghori
Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworthy person or organization. Since most online users are unaware of the techniques used in carrying...