-
Anon Cyber Team Indonesia
seems it just organization that talking about computer that have many geeks in there, but did you realize if they would be greater than that? unfortunately in first statement is true and in the second statement is also true. well you would not get that in your mind, but today I want to post article…
-
Hidden Uploader
So many technique that can accessing server via website like SQLi and Hidden Uploader, hidden uploader is a file containing function to upload data that can triggered from the live web or remote exploiting. This is caused because some Administrator that don’t know about program, making the sites vulnerable but this is need a great…
-
Drupal RCE bug
Hackers have started exploiting a recently disclosed critical vulnerability in Drupal shortly after the public release of working exploit code. Three weeks ago, Drupal security team discovered a highly critical remote code execution vulnerability, dubbed Drupalgeddon2, in its content management system software that could allow attackers to completely take over vulnerable websites. To address this…
-
IP Address
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was developed in 1995, and standardized as RFC 2460 in 1998. IPv6 deployment has been ongoing since the mid-2000s. IP addresses are usually written…