IT Security
-
Burp Suite
Burp Suite: For our purposes, we will use Burp Suite Intercept (or just Burp for short) as our proxy as…
Read More » -
BRUTE FORCE AUTHENTICATION ATTACKS
Brute Force Attacks: Authentication actually takes place in many other parts of the web application other then the main login…
Read More » -
Operating System Command Injection Vulnerabilities
O/S Command Injection Vulnerabilities: Another attack vector that is part of injection is operating system command injection. This occurs when…
Read More » -
USING NMAP TO PERFORM AN XMAS SCAN
XMAS SCAN: In the computer world, a request for comments (RFC) is a document that contains either notes or the…
Read More » -
Understanding Wireless Devices
Wireless Devices: Mobile devices, including Smartphones, e-book readers, and tablet computers, are popular. Many of these devices use either RF…
Read More » -
EXTRACTING INFORMATION FROM E-MAIL SERVERS
E-Mail Servers: E-mail servers can provide a wealth of information for hackers and penetration testers. In many ways, e-mail is…
Read More » -
Using a Sniffer – Sniffer Tools
Using a Sniffer: We touched on some of the basics of using a sniffer in the previous section, but now…
Read More » -
Planting a Backdoor – Using Netcat
Planting a Backdoor: There are many ways to plant a backdoor on a system, but let’s look at one provided…
Read More » -
DNS Spoofing – Performing DNS Spoofing
DNS Spoofing: DNS is an important service for just about any network today. Some networks, such as those that use…
Read More » -
The Life and Times of a Virus
The Life and Times of the virus: Let’s explore what it meant to be a virus before we get too…
Read More »