Looking for [intentionally made] vulnerable applications suitable for practicing different penetration techniques (NOT a web apps, user side ones)

I’m looking for different kinds of applications which is intentionnaly (or not) made vulnerable and so are suitable for practicing different penetration techniques, like SQL injections, buffer overflows and such.

There are p… Continue reading Looking for [intentionally made] vulnerable applications suitable for practicing different penetration techniques (NOT a web apps, user side ones)

Is it fundamentally possible to validate that an unmodified version of your client connects to your server?

Is it fundamentally possible to validate that an unmodified version of your client connects to your server?
I was just thinking about the idea of having my client-side app hash its own source code and sends that as a key to the server with… Continue reading Is it fundamentally possible to validate that an unmodified version of your client connects to your server?

Digital Signatures of XML, PDF and Office Documents on every platform

I’m trying to develop a website that performs digital signatures on client-side and then sent the signed document to the server-side. I want to do the signatures on client, due to the fact of not sending away the user’s private key. This k… Continue reading Digital Signatures of XML, PDF and Office Documents on every platform

Digital Signatures of XML, PDF and Office Documents on every platform

I’m trying to develop a website that performs digital signatures on client-side and then sent the signed document to the server-side. I want to do the signatures on client, due to the fact of not sending away the user’s private key. This k… Continue reading Digital Signatures of XML, PDF and Office Documents on every platform