No Picture

SESSION ATTACKS

February 10, 2017 Shivanshu 0

Here are some of the most popular session attacks that are currently being used by hackers to exploit session vulnerabilities. Session hijacking: This is when […]

No Picture

Securing Operating Systems

February 9, 2017 Shivanshu 0

You can implement various operating system security measures to ensure that passwords are protected.Regularly perform these low‐tech and high‐tech password‐cracking tests to make sure that […]

No Picture

Password‐cracking softwares

February 8, 2017 Shivanshu 0

You can try to crack your organization’s operating system and application passwords with various password‐cracking tools:✓Brutus cracks logons for HTTP, FTP, telnet, and more.✓Cain & […]

No Picture

Thinking Like The Bad Guys

February 7, 2017 Shivanshu 0

Malicious attackers often think and work like  thieves,  kidnappers,  and  other  organized criminals you hear about in the news every day. The  smart  ones  constantly […]

No Picture

Hacking Web 2.0

February 5, 2017 Shivanshu 0

Newer web technologies, originally dubbed “Web 2.0,” have changed how the Internet is used. From YouTube to Facebook to Twitter, new server and client‐side technologies, […]

No Picture

Wi‐Fi Protected Setup

February 5, 2017 Shivanshu 0

 Wi‐Fi Protected Setup (WPS) is a wireless standard that enables simple connectivity to “secure” wireless APs. The problem with WPS is that its implementation of […]

No Picture

Social Engineering Toolkit (SET)

February 4, 2017 Shivanshu 0

Social Engineering Toolkit  (SET) is an advanced,  multifunctional, and easy-to-use computer-assisted social engineering toolset, created by the founders of  TrustedSec (https://www.trustedsec.com/). It helps you prepare […]

No Picture

Don’t Overlook Bluetooth

February 3, 2017 Shivanshu 0

You undoubtedly have various Bluetooth‐enabled wireless devices, such as laptops and smartphones, running within your organization. Although vulnerabilities are not as prevalent as they are […]