Konuyu Oyla:
  • Toplam: 1 Oy - Ortalama: 5
  • 1
  • 2
  • 3
  • 4
  • 5
   
Konu: Capec Mitre Web Hacking Saldırı Mekanizmaları
KingSkrupellos
*
avatar
Hacktivist
Durum: Çevrimdışı
Seviye Puanı: 56
Yaşam Puanı: 1,382 / 1,382
Deneyim: 30 / 100
Rep Sayısı: 2826
Mesaj Sayısı: 6456
Üyelik Tarihi: 21.08.2013
     
Yorum: #1
Capec Mitre Web Hacking Saldırı Mekanizmaları
15.04.2019 13:43
Capec Mitre Web Saldırı Mekanizmaları

Common Attack X Enumeration and Classification CAPEC
A Community Resource for Identifying and Understanding Attacks
1000 - Mechanisms of Attack

Genel Saldırı Model Numaralandırma ve Sınıflandırması CAPEC
Saldırıları Belirlemek ve Anlamak için Bir Topluluk Kaynağı



Author : KingSkrupellos
Team : Cyberizm Digital Security Army
Original WebSite : capec.mitre.org
Source : capec.mitre.org/data/definitions/1000.html
Download Links :
capec.mitre.org/data/csv/1000.csv.zip
capec.mitre.org/data/xml/views/1000.xml.zip

*********************************************

1000 - Mechanisms of Attack
Deceptive Interactions - (156)
Content Spoofing - (148)
Checksum Spoofing - (145)
Spoofing of UDDI/ebXML Messages - (218)
Intent Spoof - (502)
Artificially Inflate File Sizes - (572)
Counterfeit GPS Signals - (627)
Carry-Off GPS Attack - (628)
Identity Spoofing - (151)
Fake the Source of Data - (194)
DNS Rebinding - (275)
Counterfeit Websites - (543)
Counterfeit Organizations - (544)
DNS Spoofing - (598)
Token Impersonation - (633)
Principal Spoof - (195)
Cross Frame Scripting (XFS) - (587)
Terrestrial Jamming - (599)
Signature Spoof - (473)
Creating a Rogue Certification Authority Certificate - (459)
Signature Spoofing by Key Theft - (474)
Signature Spoofing by Improper Validation - (475)
Signature Spoofing by Misrepresentation - (476)
Signature Spoofing by Mixing Signed and Unsigned Content - (477)
Malicious Root Certificate - (479)
Signature Spoofing by Key Recreation - (485)
Pharming - (89)
Phishing - (98)
Spear Phishing - (163)
Mobile Phishing - (164)
Resource Location Spoofing - (154)
Redirect Access to Libraries - (159)
Symlink Attack - (132)
Leveraging/Manipulating Configuration File Search Paths - (38)
Search Order Hijacking - (471)
DLL Side-Loading - (641)
Establish Rogue Location - (616)
BitSquatting - (611)
Evil Twin Wi-Fi Attack - (615)
Cellular Rogue Base Station - (617)
TypoSquatting - (630)
SoundSquatting - (631)
Homograph Attack via Homoglyphs - (632)
Action Spoofing - (173)
Clickjacking - (103)
Flash File Overlay - (181)
iFrame Overlay - (222)
Activity Hijack - (501)
Task Impersonation - (504)
Scheme Squatting - (505)
Tapjacking - (506)
Manipulate Human Behavior - (416)
Pretexting - (407)
Harvesting Information via API Event Monitoring - (383)
Pretexting via Customer Service - (412)
Pretexting via Tech Support - (413)
Pretexting via Delivery Person - (414)
Pretexting via Phone - (415)
Influence Perception - (417)
Influence Perception of Reciprocation - (418)
Influence Perception of Scarcity - (420)
Influence Perception of Authority - (421)
Influence Perception of Commitment and Consistency - (422)
Influence Perception of Liking - (423)
Influence Perception of Consensus or Social Proof - (424)
Target Influence via Framing - (425)
Influence via Incentives - (426)
Influence via Psychological Principles - (427)
Influence via Modes of Thinking - (428)
Target Influence via Eye Cues - (429)
Target Influence via The Human Buffer Overflow - (433)
Target Influence via Interview and Interrogation - (434)
Target Influence via Instant Rapport - (435)
-CategoryAbuse Existing Functionality - (210)
API Manipulation - (113)
Flooding - (125)
TCP Flood - (482)
UDP Flood - (486)
ICMP Flood - (487)
HTTP Flood - (488)
SSL Flood - (489)
Amplification - (490)
XML Flood - (528)
XML Ping of the Death - (147)
Excessive Allocation - (130)
XML Nested Payloads - (230)
XML Entity Expansion - (197)
XML Quadratic Expansion - (491)
XML Oversized Payloads - (231)
XML Entity Linking - (201)
XML Attribute Blowup - (229)
Regular Expression Exponential Blowup - (492)
SOAP Array Blowup - (493)
TCP Fragmentation - (494)
UDP Fragmentation - (495)
ICMP Fragmentation - (496)
Resource Leak Exposure - (131)
Functionality Misuse - (212)
JSON Hijacking (aka JavaScript Hijacking) - (111)
Inducing Account Lockout - (2)
Passing Local Filenames to Functions That Expect a URL - (48)
Password Recovery Exploitation - (50)
Drop Encryption Level - (620)
Weakening of Cellular Encryption - (606)
Communication Channel Manipulation - (216)
Choosing Message Identifier - (12)
Exploiting Incorrectly Configured SSL - (217)
Sustained Client Engagement - (227)
HTTP DoS - (469)
Protocol Manipulation - (272)
Client-Server Protocol Manipulation - (220)
HTTP Request Splitting - (105)
HTTP Response Smuggling - (273)
HTTP Verb Tampering - (274)
HTTP Request Smuggling - (33)
HTTP Response Splitting - (34)
Blue Boxing - (5)
Reflection Attack in Authentication Protocol - (90)
Inter-component Protocol Manipulation - (276)
Data Interchange Protocol Manipulation - (277)
Web Services Protocol Manipulation - (278)
XML Entity Linking - (201)
XML External Entities Blowup - (221)
SOAP Manipulation - (279)
Functionality Bypass - (554)
Calling Micro-Services Directly - (179)
Evercookie - (464)
Transparent Proxy Abuse - (465)
Data Structures - (255)
Buffer Manipulation - (123)
Overflow Buffers - (100)
Buffer Overflow via Environment Variables - (10)
Client-side Injection-induced Buffer Overflow - (14)
Filter Failure through Buffer Overflow - (24)
SOAP Array Overflow - (256)
MIME Conversion - (42)
Overflow Binary Resource File - (44)
Buffer Overflow via Symbolic Links - (45)
Overflow Variables and Tags - (46)
Buffer Overflow via Parameter Expansion - (47)
String Format Overflow in syslog() - (67)
Buffer Overflow in an API Call - (8)
Buffer Overflow in Local Command-Line Utilities - (9)
Overread Buffers - (540)
Shared Data Manipulation - (124)
Pointer Manipulation - (129)
Input Data Manipulation - (153)
Path Traversal - (126)
Relative Path Traversal - (139)
Absolute Path Traversal - (597)
Manipulating Web Input to File System Calls - (76)
Integer Attacks - (128)
Forced Integer Overflow - (92)
Leverage Alternate Encoding - (267)
Double Encoding - (120)
Using Leading 'Ghost' Character Sequences to Bypass Input Filters - (3)
Using Alternative IP Address Encodings - (4)
Exploiting Multiple Input Interpretation Layers - (43)
Embedding NULL Bytes - (52)
Postfix, Null Terminate, and Backslash - (53)
Using Slashes and URL Encoding Combined to Bypass Validation Logic - (64)
Using Unicode Encoding to Bypass Validation Logic - (71)
URL Encoding - (72)
Using Escaped Slashes in Alternate Encoding - (78)
Using Slashes in Alternate Encoding - (79)
Using UTF-8 Encoding to Bypass Validation Logic - (80)
System Resources - (262)
Software Integrity Attack - (184)
Malicious Software Download - (185)
Malicious Software Update - (186)
Malicious Automated Software Update - (187)
Malicious Manual Software Update - (533)
Rooting SIM Cards - (614)
Hardware Integrity Attack - (440)
Hacking Hardware - (401)
Bypassing ATA Password Security - (402)
Malicious Hardware Update - (534)
Hardware Component Substitution - (531)
Provide Counterfeit Component - (530)
Malicious Gray Market Hardware - (535)
Infrastructure Manipulation - (161)
Cache Poisoning - (141)
DNS Cache Poisoning - (142)
Force the System to Reset Values - (166)
Audit Log Manipulation - (268)
Web Logs Tampering - (81)
Log Injection-Tampering-Forging - (93)
Contradictory Destinations in Traffic Routing Schemes - (481)
Block Logging to Central Repository - (571)
File Manipulation - (165)
Using Malicious Files - (17)
Create files with the same name as files protected with a higher classification - (177)
Force Use of Corrupted Files - (263)
Modify Shared File - (562)
Add Malicious File to Shared Webroot - (563)
Replace Binaries - (642)
Upload a Web Shell to a Web Server - (650)
Alternative Execution Due to Deceptive Filenames - (635)
Cause Web Server Misclassification - (11)
Adding a Space to a File Extension - (649)
Hiding Malicious Data or Code within Files - (636)
Windows ::DATA Alternate Data Stream - (168)
Leverage Executable Code in Non-Executable Files - (35)
User-Controlled Filename - (73)
Configuration/Environment Manipulation - (176)
Manipulate Registry Information - (203)
Modification of Registry Run Keys - (270)
Modification of Windows Service Configuration - (478)
Poison Web Service Registry - (51)
Schema Poisoning - (271)
XML Schema Poisoning - (146)
Data Injected During Configuration - (536)
Disable Security Software - (578)
Manipulating Writeable Configuration Files - (75)
Obstruction - (607)
Physical Destruction of Device or Component - (547)
Route Disabling - (582)
Disabling Network Hardware - (583)
BGP Route Disabling - (584)
DNS Domain Seizure - (585)
Jamming - (601)
Orbital Jamming - (559)
Wi-Fi Jamming - (604)
Cellular Jamming - (605)
Blockage - (603)
DNS Blocking - (589)
IP Address Blocking - (590)
Block Access to Libraries - (96)
Modification During Manufacture - (438)
Development Alteration - (444)
Malicious Logic Inserted Into Product Software by Authorized Developer - (443)
Malicious Logic Insertion into Product Software via Configuration Management Manipulation - (445)
Malicious Logic Insertion into Product Software via Inclusion of 3rd Party Component Dependency - (446)
Infiltration of Software Development Environment - (511)
Hardware Component Substitution During Baselining - (516)
Counterfeit Hardware Component Inserted During Product Assembly - (520)
Altered Installed BIOS - (532)
Infiltration of Hardware Development Environment - (537)
Open Source Libraries Altered - (538)
ASIC With Malicious Functionality - (539)
Design Alteration - (447)
Documentation Alteration to Circumvent Dial-down - (517)
Documentation Alteration to Produce Under-performing Systems - (518)
Documentation Alteration to Cause Errors in System Design - (519)
Hardware Design Specifications Are Altered - (521)
Manipulation During Distribution - (439)
Malicious Hardware Component Replacement - (522)
Malicious Software Implanted - (523)
Rogue Integration Procedures - (524)
Malicious Logic Insertion - (441)
Infected Software - (442)
Embed Virus into DLL - (448)
Infected Hardware - (452)
Altered Component Firmware - (638)
Infected Memory - (456)
USB Memory Attacks - (457)
Flash Memory Attacks - (458)
Contaminate Resource - (548)
+CategoryInject Unexpected Items - (152)
Parameter Injection - (137)
Email Injection - (134)
Using Meta-characters in E-mail Headers to Inject Malicious Payloads - (41)
Format String Injection - (135)
Reflection Injection - (138)
Command Delimiters - (15)
HTTP Parameter Pollution (HPP) - (460)
Flash Injection - (182)
Flash Parameter Injection - (174)
Cross-Site Flashing - (178)
Argument Injection - (6)
Code Inclusion - (175)
Local Code Inclusion - (251)
PHP Local File Inclusion - (252)
Inclusion of Code in Existing Process - (640)
Remote Code Inclusion - (253)
Server Side Include (SSI) Injection - (101)
PHP Remote File Inclusion - (193)
WebView Injection - (500)
Resource Injection - (240)
Cellular Data Injection - (610)
Code Injection - (242)
Embedding Scripts within Scripts - (19)
File Content Injection - (23)
Overflow Binary Resource File - (44)
Using Meta-characters in E-mail Headers to Inject Malicious Payloads - (41)
Generic Cross-Browser Cross-Domain Theft - (468)
Cross-Site Scripting (XSS) - (63)
DOM-Based XSS - (588)
XSS Targeting Non-Script Elements - (18)
XSS Targeting Error Pages - (198)
XSS Using Alternate Syntax - (199)
XSS Targeting HTML Attributes - (243)
XSS Targeting URI Placeholders - (244)
XSS Using Doubled Characters - (245)
XSS Using Invalid Characters - (247)
XSS Through HTTP Query Strings - (32)
XSS Through HTTP Headers - (86)
Reflected XSS - (591)
XSS Targeting Non-Script Elements - (18)
XSS Targeting Error Pages - (198)
XSS Using Alternate Syntax - (199)
XSS Targeting HTML Attributes - (243)
XSS Targeting URI Placeholders - (244)
XSS Using Doubled Characters - (245)
XSS Using Invalid Characters - (247)
XSS Through HTTP Query Strings - (32)
XSS Through HTTP Headers - (86)
Stored XSS - (592)
XSS Targeting Non-Script Elements - (18)
XSS Targeting Error Pages - (198)
XSS Using Alternate Syntax - (199)
XSS Using MIME Type Mismatch - (209)
XSS Targeting HTML Attributes - (243)
XSS Targeting URI Placeholders - (244)
XSS Using Doubled Characters - (245)
XSS Using Invalid Characters - (247)
Command Injection - (248)
LDAP Injection - (136)
IMAP/SMTP Command Injection - (183)
XML Injection - (250)
DTD Injection - (228)
XPath Injection - (83)
XQuery Injection - (84)
Manipulating Writeable Terminal Devices - (40)
SQL Injection - (66)
Command Line Execution through SQL Injection - (108)
Object Relational Mapping Injection - (109)
SQL Injection through SOAP Parameter Tampering - (110)
Expanding Control over the Operating System from the Database - (470)
Blind SQL Injection - (7)
OS Command Injection - (88)
Local Execution of Code - (549)
Targeted Malware - (542)
Install New Service - (550)
Modify Existing Service - (551)
Install Rootkit - (552)
Replace File Extension Handlers - (556)
Replace Trusted Executable - (558)
Run Software at Logon - (564)
Replace Winlogon Helper DLL - (579)
Fault Injection - (624)
Mobile Device Fault Injection - (625)
Traffic Injection - (594)
Connection Reset - (595)
TCP RST Injection - (596)
Object Injection - (586)
+CategoryEmploy Probabilistic Techniques - (223)
Brute Force - (112)
Encryption Brute Forcing - (20)
Password Brute Forcing - (49)
Dictionary-based Password Attack - (16)
Rainbow Table Password Cracking - (55)
Try Common or Default Usernames and Passwords - (70)
Fuzzing - (28)
Timing and State - (172)
Forced Deadlock - (25)
Leveraging Race Conditions - (26)
Leveraging Race Conditions via Symbolic Links - (27)
Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions - (29)
Manipulating User State - (74)
Bypassing of Intermediate Forms in Multiple-Form Sets - (140)
+CategoryCollect and Analyze Information - (118)
Excavation - (116)
Collect Data from Common Resource Locations - (150)
Detect Unpublicized Web Pages - (143)
Detect Unpublicized Web Services - (144)
Screen Temporary Files for Sensitive Information - (155)
Accessing/Intercepting/Modifying HTTP Cookies - (31)
Dumpster Diving - (406)
Collect Data from Clipboard - (637)
Collect Data from Registries - (647)
Collect Data from Screen Capture - (648)
Query System for Information - (54)
Directory Indexing - (127)
Fuzzing for garnering J2EE/.NET-based stack traces, for application mapping - (214)
Fuzzing and observing application log data/errors for application mapping - (215)
Fuzzing for garnering other adjacent user/sensitive data - (261)
Cross-Domain Search Timing - (462)
WSDL Scanning - (95)
Pull Data from System Resources - (545)
Probe iOS Screenshots - (498)
Probe Application Memory - (546)
Probe Audio and Video Peripherals - (634)
Probe System Files - (639)
Collect Data as Provided by Users - (569)
Capture Credentials via Keylogger - (568)
Interception - (117)
Sniffing Attacks - (157)
Sniffing Network Traffic - (158)
Accessing/Intercepting/Modifying HTTP Cookies - (31)
Cellular Traffic Intercept - (609)
Sniff Application Code - (65)
Intent Intercept - (499)
Activity Hijack - (501)
Eavesdropping - (651)
Probe Audio and Video Peripherals - (634)
Footprinting - (169)
Explore for Predictable Temporary File Names - (149)
Host Discovery - (292)
ICMP Echo Request Ping - (285)
ICMP Address Mask Request - (294)
Timestamp Request - (295)
ICMP Information Request - (296)
TCP ACK Ping - (297)
UDP Ping - (298)
TCP SYN Ping - (299)
WiFi MAC Address Tracking - (612)
WiFi SSID Tracking - (613)
Cellular Broadcast Message Request - (618)
Signal Strength Tracking - (619)
Port Scanning - (300)
TCP SYN Scan - (287)
TCP Connect Scan - (301)
TCP FIN Scan - (302)
TCP Xmas Scan - (303)
TCP Null Scan - (304)
TCP ACK Scan - (305)
TCP Window Scan - (306)
TCP RPC Scan - (307)
UDP Scan - (308)
Network Topology Mapping - (309)
Enumerate Mail Exchange (MX) Records - (290)
DNS Zone Transfers - (291)
Traceroute Route Enumeration - (293)
Identify Shared Files/Directories on System - (643)
Malware-Directed Internal Reconnaissance - (529)
Process Footprinting - (573)
Services Footprinting - (574)
Account Footprinting - (575)
Group Permission Footprinting - (576)
Owner Footprinting - (577)
Application Footprinting - (580)
Security Software Footprinting - (581)
Peripheral Footprinting - (646)
Fingerprinting - (224)
Active OS Fingerprinting - (312)
IP ID Sequencing Probe - (317)
IP 'ID' Echoed Byte-Order Probe - (318)
IP (DF) 'Don't Fragment Bit' Echoing Probe - (319)
TCP Timestamp Probe - (320)
TCP Sequence Number Probe - (321)
TCP (ISN) Greatest Common Divisor Probe - (322)
TCP (ISN) Counter Rate Probe - (323)
TCP (ISN) Sequence Predictability Probe - (324)
TCP Congestion Control Flag (ECN) Probe - (325)
TCP Initial Window Size Probe - (326)
TCP Options Probe - (327)
TCP 'RST' Flag Checksum Probe - (328)
ICMP Error Message Quoting Probe - (329)
ICMP Error Message Echoing Integrity Probe - (330)
ICMP IP Total Length Field Probe - (331)
ICMP IP 'ID' Field Error Message Probe - (332)
Passive OS Fingerprinting - (313)
Application Fingerprinting - (541)
Web Application Fingerprinting - (170)
Scanning for Vulnerable Software - (310)
Browser Fingerprinting - (472)
AJAX Fingerprinting - (85)
Reverse Engineering - (188)
White Box Reverse Engineering - (167)
Reverse Engineer an Executable to Expose Assumed Hidden Functionality - (190)
Read Sensitive Strings Within an Executable - (191)
Lifting Sensitive Data Embedded in Cache - (204)
Retrieve Embedded Sensitive Data - (37)
Smudge Attack - (626)
Black Box Reverse Engineering - (189)
Analysis of Packet Timing and Sizes - (621)
Electromagnetic Side-Channel Attack - (622)
Compromising Emanations Attack - (623)
Protocol Analysis - (192)
Cryptanalysis - (97)
Padding Oracle Crypto Attack - (463)
Cryptanalysis of Cellular Encryption - (608)
Information Elicitation - (410)
Pretexting - (407)
Harvesting Information via API Event Monitoring - (383)
Pretexting via Customer Service - (412)
Pretexting via Tech Support - (413)
Pretexting via Delivery Person - (414)
Pretexting via Phone - (415)
+CategorySubvert Access Control - (225)
Exploitation of Trusted Credentials - (21)
Session Credential Falsification through Forging - (196)
Session Credential Falsification through Manipulation - (226)
Session Credential Falsification through Prediction - (59)
SaaS User Request Forgery - (510)
Use of Known Domain Credentials - (560)
Kerberoasting - (509)
Remote Services with Stolen Credentials - (555)
Windows Admin Shares with Stolen Credentials - (561)
Use of Captured Hashes (Pass The Hash) - (644)
Use of Captured Tickets (Pass The Ticket) - (645)
Session Hijacking - (593)
Session Sidejacking - (102)
Cross Site Tracing - (107)
Reusing Session IDs (aka Session Replay) - (60)
Session Fixation - (61)
Cross Site Request Forgery - (62)
Cross Site Identification - (467)
Authentication Abuse - (114)
Unauthorized Use of Device Resources - (629)
Reflection Attack in Authentication Protocol - (90)
Authentication Bypass - (115)
Escaping a Sandbox by Calling Signed Code in Another Language - (237)
Web Services API Signature Forgery Leveraging Hash Function Extension Weakness - (461)
Forceful Browsing - (87)
Exploiting Trust in Client - (22)
Create Malicious Client - (202)
Removing Important Client Functionality - (207)
Removal of filters: Input filters, output filters, data masking - (200)
Removing/short-circuiting 'Purse' logic: removing/mutating 'cash' decrements - (208)
Manipulating Opaque Client-based Data Tokens - (39)
Accessing/Intercepting/Modifying HTTP Cookies - (31)
Manipulating User-Controlled Variables - (77)
Subverting Environment Variable Values - (13)
Manipulating Hidden Fields - (162)
Man in the Middle Attack - (94)
XML Routing Detour Attacks - (219)
Application API Message Manipulation via Man-in-the-Middle - (384)
Transaction or Event Tampering via Application API Manipulation - (385)
Application API Navigation Remapping - (386)
Navigation Remapping To Propagate Malicious Content - (387)
Application API Button Hijacking - (388)
Content Spoofing Via Application API Manipulation - (389)
Leveraging Active Man in the Middle Attacks to Bypass Same Origin Policy - (466)
Utilizing REST's Trust in the System Resource to Register Man in the Middle - (57)
Privilege Abuse - (122)
Accessing Functionality Not Properly Constrained by ACLs - (1)
Using Malicious Files - (17)
Create files with the same name as files protected with a higher classification - (177)
Force Use of Corrupted Files - (263)
Modify Shared File - (562)
Add Malicious File to Shared Webroot - (563)
Replace Binaries - (642)
Upload a Web Shell to a Web Server - (650)
Restful Privilege Elevation - (58)
Exploiting Incorrectly Configured Access Control Security Levels - (180)
XML External Entities Blowup - (221)
WebView Exposure - (503)
Privilege Escalation - (233)
Cross Zone Scripting - (104)
Using Malicious Files - (17)
Create files with the same name as files protected with a higher classification - (177)
Force Use of Corrupted Files - (263)
Modify Shared File - (562)
Add Malicious File to Shared Webroot - (563)
Replace Binaries - (642)
Upload a Web Shell to a Web Server - (650)
Hijacking a privileged process - (234)
Hijacking a Privileged Thread of Execution - (30)
Catching exception throw/signal from privileged block - (236)
Restful Privilege Elevation - (58)
Subvert Code-signing Facilities - (68)
Signing Malicious Code - (206)
Escaping a Sandbox by Calling Signed Code in Another Language - (237)
Target Programs with Elevated Privileges - (69)
Bypassing Physical Security - (390)
Bypassing Physical Locks - (391)
Lock Bumping - (392)
Lock Picking - (393)
Using a Snap Gun Lock to Force a Lock - (394)
Bypassing Electronic Locks and Access Controls - (395)
Bypassing Card or Badge-Based Systems - (396)
Cloning Magnetic Strip Cards - (397)
Magnetic Strip Card Brute Force Attacks - (398)
Cloning RFID Cards or Chips - (399)
RFID Chip Deactivation or Destruction - (400)
Physical Theft - (507)

----------------- THE END --------------------

# Cyberizm Digital Security Technological Turkish Moslem Army #
# İnsanda bir organ vardır. Eğer o sağlıklı ise bütün vücut sağlıklı olur;
eğer o bozulursa bütün vücut bozulur. Dikkat edin! O, kalptir.
[ Hz.Muhammed S.A.V ] #


Alinti
Rep Verenler: The_ZiziL , MECZUP
The_ZiziL
*
avatar
Valhalla
Durum: Çevrimdışı
Seviye Puanı: 36
Yaşam Puanı: 894 / 894
Deneyim: 76 / 100
Rep Sayısı: 575
Mesaj Sayısı: 1971
Üyelik Tarihi: 06.02.2017
     
Yorum: #2
RE: Capec Mitre Web Hacking Saldırı Mekanizmaları
15.04.2019 13:44
Teşekkürler, Emeğine Sağlık.

Allah’tan utanmayan insanlardan da utanmaz…
Alinti
MECZUP
*
avatar
Binbaşı
Durum: Çevrimdışı
Seviye Puanı: 14
Yaşam Puanı: 340 / 340
Deneyim: 63 / 100
Rep Sayısı: 33
Mesaj Sayısı: 245
Üyelik Tarihi: 17.10.2018
      
Yorum: #3
RE: Capec Mitre Web Hacking Saldırı Mekanizmaları
15.04.2019 16:36
Emeğine Sağlık Reis

Meczup Official

VarsaYoksa Cyberizm
Alinti
DeathWing
*
avatar
Teğmen
Durum: Çevrimdışı
Seviye Puanı: 5
Yaşam Puanı: 100 / 100
Deneyim: 2 / 100
Rep Sayısı: 9
Mesaj Sayısı: 39
Üyelik Tarihi: 26.03.2019
     
Yorum: #4
RE: Capec Mitre Web Hacking Saldırı Mekanizmaları
15.04.2019 22:46
Teşekkürler, Emeğine Sağlık Smile
Alinti
Hackmen
*
avatar
Binbaşı
Durum: Çevrimdışı
Seviye Puanı: 15
Yaşam Puanı: 189 / 364
Deneyim: 59 / 100
Rep Sayısı: 17
Mesaj Sayısı: 278
Üyelik Tarihi: 01.11.2017
     
Yorum: #5
RE: Capec Mitre Web Hacking Saldırı Mekanizmaları
18.04.2019 20:45
Teşekkürler, Emeğine Sağlık Smile

Sanal Alemin Efsanesi
Alinti



1 Ziyaretçi