tag:blogger.com,1999:blog-7337853103195839314.post1690418477144966094..comments2022-03-26T15:08:38.707-07:00Comments on Immunity Products: STALKER - Analyzing [Your] Wireless DataDave Aitelhttp://www.blogger.com/profile/17021799961866070637noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-7337853103195839314.post-32171671450028415852012-08-16T14:11:07.976-07:002012-08-16T14:11:07.976-07:00Thats pretty cool! But i was speaking of all value...Thats pretty cool! But i was speaking of all values from the html inputs. Besides passwords and emails there is also stuff like cc,firstname,lastname,adress... and they are not explicit savedh43zhttps://www.blogger.com/profile/01006449857349220893noreply@blogger.comtag:blogger.com,1999:blog-7337853103195839314.post-65444919238082881782012-08-14T17:19:13.562-07:002012-08-14T17:19:13.562-07:00Seems like a great tool, pretty useful and dynamic...Seems like a great tool, pretty useful and dynamic. Great work!Anonymoushttps://www.blogger.com/profile/01141231337231093521noreply@blogger.comtag:blogger.com,1999:blog-7337853103195839314.post-1037729803678763912012-08-13T06:49:27.639-07:002012-08-13T06:49:27.639-07:00SILICA actually has a feature that pulls saved pas...SILICA actually has a feature that pulls saved passwords right out of the browser remotely via injection. I talked about the technique at INFILTRATE. Here is a video of SILICA doing the Browser Auto-Complete Password Attack:<br /><br />http://partners.immunityinc.com/movies/Silica-BrowserAutoFill-Take2.mov<br /><br />Mark Wuerglerhttps://www.blogger.com/profile/00097919746468303839noreply@blogger.comtag:blogger.com,1999:blog-7337853103195839314.post-50177117024620510842012-08-09T19:00:37.074-07:002012-08-09T19:00:37.074-07:00sick tool! maybe you can use somehing like this ht...sick tool! maybe you can use somehing like this http://tinyurl.com/9ze6x3v if you know how to get this low hanging fruit. leava a comment if you have an idea ;)h43zhttps://www.blogger.com/profile/01006449857349220893noreply@blogger.comtag:blogger.com,1999:blog-7337853103195839314.post-37514830851406243832012-08-09T17:49:47.032-07:002012-08-09T17:49:47.032-07:00Me wanti! I could sooo use this for stalk...err......Me wanti! I could sooo use this for stalk...err... Helping me with enumeration during a Vulnerability Test and uh... you know, legit stuff. (<_<)...(>_>)Anonymoushttps://www.blogger.com/profile/06568382968866120112noreply@blogger.com