No Picture

Brute-force Attacks

February 14, 2017 Shivanshu 0

We start off our discussion of UNIX attacks with the most basic form of attack— brute-force password guessing.  A brute-force attack may not appear sexy, […]

No Picture

Cracking files

February 11, 2017 Shivanshu 0

Most password‐protected files can be cracked in seconds or minutes. You can demonstrate this “wow factor” security vulnerability to users and management. Here’s a hypothetical […]

No Picture

SESSION ATTACKS

February 10, 2017 Shivanshu 0

Here are some of the most popular session attacks that are currently being used by hackers to exploit session vulnerabilities. Session hijacking: This is when […]

No Picture

Securing Operating Systems

February 9, 2017 Shivanshu 0

You can implement various operating system security measures to ensure that passwords are protected.Regularly perform these low‐tech and high‐tech password‐cracking tests to make sure that […]

No Picture

Password‐cracking softwares

February 8, 2017 Shivanshu 0

You can try to crack your organization’s operating system and application passwords with various password‐cracking tools:✓Brutus cracks logons for HTTP, FTP, telnet, and more.✓Cain & […]

No Picture

Thinking Like The Bad Guys

February 7, 2017 Shivanshu 0

Malicious attackers often think and work like  thieves,  kidnappers,  and  other  organized criminals you hear about in the news every day. The  smart  ones  constantly […]

No Picture

Hacking Web 2.0

February 5, 2017 Shivanshu 0

Newer web technologies, originally dubbed “Web 2.0,” have changed how the Internet is used. From YouTube to Facebook to Twitter, new server and client‐side technologies, […]

No Picture

Wi‐Fi Protected Setup

February 5, 2017 Shivanshu 0

 Wi‐Fi Protected Setup (WPS) is a wireless standard that enables simple connectivity to “secure” wireless APs. The problem with WPS is that its implementation of […]