MIS | SiteLogin | Login
Call: +966920012552 | E:mail:info@shacotel.com

Providers



Our Clients

We are specialized in
creating & implementing telecommunication network infrastructure.

Shihab Hamad Al Sahdoon Company (SHASCO), one of the growing telecommunication firm in the Kingdom of Saudi Arabia. SHASCO was established in 2001, with the aim of addressing the region's needs for specialized skills and know how in field of telecom networking and related technologies. Over the years, SHASCO has specialized in building and managing mobile and fixed line network infrastructure.

SHASCO was directly involved in the implementation for several high profile projects in the kingdom of Saudi Arabia, and has also contributed to a great extend to the development of the gulf regions telecommunications network. The headquarters of SHASCO is based in Riyadh, and the firm disposes of several branches spread over the kingdom of Saudi Arabia, the majority of SHASCO personnel have engineering or technical degrees, and dispose of solid experience in telecommunication related fields, employees are furthermore trained on new equipment and technologies by the vendors.


SHASCO telecom is one of the growing telecommunication firm in the Kingdom of Saudi Arabia was established in 2001, with the aim of addressing.....read more

Shihab Hamad Al Sahdoon Company (SHASCO), one of the growing telecommunication firm in the Kingdom of Saudi Arabia. SHASCO was established in 2001...read more

SomeCustomInjectedHeader:injected_by_wvs
1


../../../../../../../../../../etc/passwd
1


cat /etc/passwd
1


..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg
1


1
1


01/01/1967
response.write(9308066*9064652)


"&cat /etc/passwd&"
1


response.write(9616545*9202980)
1


01/01/1967
1


&cat /etc/passwd&
1


01/01/1967
1


"+response.write(9616545*9202980)+"
1


01/01/1967
1


SomeCustomInjectedHeader:injected_by_wvs
1


1
1


01/01/1967
1


`cat /etc/passwd`
1


../../../../../../../../../../etc/passwd%00.jpg
1


01/01/1967
"+response.write(9308066*9064652)+"


SomeCustomInjectedHeader:injected_by_wvs
1


1
1



1


Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAucG5n
1


01/01/1967
SomeCustomInjectedHeader:injected_by_wvs


|cat /etc/passwd#
1


01/01/1967
1


${99566+99719}
1


http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg
1


268435455
1


1
1


01/01/1967
SomeCustomInjectedHeader:injected_by_wvs


0
1


1some_inexistent_file_with_long_name%00.jpg
1


01/01/1967
1


..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg
1


%e3h
1


01/01/1967
${99209+100377}


"|"ld
1


1
1


01/01/1967
SomeCustomInjectedHeader:injected_by_wvs


..%c0%af
1


01/01/1967
1


http://testasp.vulnweb.com/t/fit.txt?%00.jpg
1


/../..//../..//../..//../..//../..//etc/passwd%00.jpg
1


01/01/1967
1


;cat /etc/passwd;
1


Y1RLYUN2eUFjWg==
1


01/01/1967&n963658=v904793
1


1
1


1e309
1


.\./.\./.\./.\./.\./.\./etc/passwd
1


01/01/1967
1&n960492=v968101


testasp.vulnweb.com
1


Array
1


)
1


;print(md5(acunetix_wvs_security_test));
1


01/01/1967
1


";cat /etc/passwd;"
1


1
1


/etc/passwd
1


01/01/1967
http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg


01/01/1967
1


!(()&&!|*|*|
1


||cat /etc/passwd
1


Array
1


01/01/1967
1


1
1


../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd
1


01/01/1967
1


01/01/1967
Array


01/01/1967
1some_inexistent_file_with_long_name%00.jpg


&dir
1


^(#$!@#$)(()))******
1


http://testasp.vulnweb.com/t/xss.html?%00.jpg
1


";print(md5(acunetix_wvs_security_test));$a="
1


01/01/1967
1


1
1


01/01/1967


../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd
1


01/01/1967
http://testasp.vulnweb.com/t/xss.html?%00.jpg


01/01/1967
)


01/01/1967
1


01/01/1967
http://testasp.vulnweb.com/t/fit.txt?%00.jpg


..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%afetc/passwd
1


01/01/1967
268435455


${@print(md5(acunetix_wvs_security_test))}
1


01/01/1967
1


1
1


"&dir&"
1


acunetix_wvs_invalid_filename
1


01/01/1967
testasp.vulnweb.com


01/01/1967
!(()&&!|*|*|


01/01/1967
1


invalid../../../../../../../../../../etc/passwd/././././././././././././././././././././././././././
1


01/01/1967
%e3h


01/01/1967
1


1
1


http://testasp.vulnweb.com/t/fit.txt
1


01/01/1967
1


01/01/1967
1


01/01/1967
^(#$!@#$)(()))******


admin1.php
1


01/01/1967
..%c0%af


01/01/1967
;print(md5(acunetix_wvs_security_test));


file:///etc/passwd
1


|dir
1


1
1


admin1.php
1


01/01/1967
1


01/01/1967
1


/../../../../../../../etc/passwd
1


01/01/1967
http://testasp.vulnweb.com/t/fit.txt


01/01/1967
1e309


01/01/1967
";print(md5(acunetix_wvs_security_test));$a="


01/01/1967
1


01/01/1967
1


admin1.php/.
1


"|dir
1


01/01/1967
1


WEB-INF/web.xml
1


01/01/1967
${@print(md5(acunetix_wvs_security_test))}


01/01/1967
1


01/01/1967
1


1xa7
1


01/01/1967
1


01/01/1967
1


01/01/1967
&cat /etc/passwd&


01/01/1967
Array


01/01/1967
1


WEB-INFweb.xml
1


01/01/1967
1 and sleep(4)


01/01/1967
acunetix_wvs_invalid_filename


)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
1


//www.acunetix.tst
1


01/01/1967
1


01/01/1967
1


01/01/1967
1 or (sleep(4)+1) limit 1 --


../../../../../../../../../../windows/win.ini
1



1


01/01/1967
)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))


@@kA8DI
1


01/01/1967
1


01/01/1967
//www.acunetix.tst


01/01/1967
1


01/01/1967
admin1.php


../../../../../../../../../../boot.ini
1


01/01/1967
1


01/01/1967
"&cat /etc/passwd&"


JyI=
1


01/01/1967
]> &acunetixent;


01/01/1967
1


01/01/1967
1


01/01/1967
1


01/01/1967
1


01/01/1967
admin1.php


../../../../../../../../../../windows/win.ini%00.jpg
1


01/01/1967
1


01/01/1967
cat /etc/passwd


01/01/1967
1


'""
1


01/01/1967
1


01/01/1967
1