Skip to content
#

hijacking

Here are 56 public repositories matching this topic...

Social Network Analysis focused on the events of 9/11/2001. By examining publicly available data through SNA techniques, we gain insights into the organizational structure of the terrorist network, offering valuable perspectives on key relationships and connections.

  • Updated Apr 13, 2024
  • Jupyter Notebook

This repository details an IDOR vulnerability in AbsysNet 2.3.1, which allows a remote attacker to brute-force session IDs via the /cgi-bin/ocap/ endpoint. Successful exploitation can compromise active user sessions, exposing authentication tokens in HTML. The attack is limited to active sessions and is terminated if the user logs out.

  • Updated Nov 24, 2024
  • Python

Improve this page

Add a description, image, and links to the hijacking topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the hijacking topic, visit your repo's landing page and select "manage topics."

Learn more