Home / Jahanzaib Khan (page 10)

Jahanzaib Khan

Jahanzaib Khan is Web Designer & Ethical Hacker. He Who has been working since 2014, and is managing several successful websites on the internet for about 3 years. Jahanzaib-khan.com

Pakistani Citizens Information Is Not More PRIVATE

Pakistani Citizens Information Is Not More PRIVATE

Pakistani Citizens Information Is Not More Private: The hackers have the complete details of every single individual in Pakistan, their NADRA details, Phone Call Details, Telecom Details, Driving License Details, and if these details go into the wrong hands they can destroy someone innocents life. Behind this all vulnerable Websites, …

Read More »

Apache Web Server

Apache Web Server

Apache Web Server: Apache web server is the most popular technology of its type in the world with an estimated 60 percent of web servers on the Internet running the software (62 percent with server derived from Apache included). While it was originally developed for the Unix platform back in …

Read More »

Tools For Creating Trojans

Tools For Creating Trojans

Tools For Creating Trojans: A wide range of tools exists that are used to take control of a victim’s system and leave behind a gift in the form of a backdoor. This is not an exhaustive list, and newer versions of many of these are released regularly. Let me Rule: …

Read More »

The PsTools Suite

The PsTools Suite

PsTools Suite: Standing tall next to our other tools is a suite of Microsoft tools designed to extract various kinds of information and perform other tasks involving a system. The tools in the PsTools suite allow you to manage remote systems as well as the local system. NOTE: You can …

Read More »

Wireless Encryption Mechanisms

Wireless Encryption Mechanisms

Wireless Encryption Mechanisms: One of the big concerns with wireless networks is the fact that the data is vulnerable when being transmitted over the air. Without proper protection, the transmitted data can be sniffed and captured easily by an attacker. To prevent or at least mitigate these issues, encryption is …

Read More »

Performing Testing Security in The Cloud Based Application

Performing Testing Security in The Cloud Based Application

Security In The Cloud: So how do you test for security in the cloud? Many options are available in both the manual and automated tools you have used with web applications, but there are other options as well. The tools listed here are discussed at SearchSecurity.com and are representative of …

Read More »

Testing Web Applications

Testing Web Applications

Testing Web Applications: Since web applications are complex, the use of specialized software to analyze or test an application may be necessary. Some of these software packages are included here. Burp Suite Burp Suite is a Java-based application used to test and attack web application. Upon closer inspection the software …

Read More »

Closer Inspection of a Web Application

Closer Inspection of a Web Application

Web Application: Web application is designed to run on web servers and send their output over the Internet. Let’s examine the running of such applications in their environment. You can visualize a web application as consisting of not only a client and server but also layers. These layers are as …

Read More »

Session Management Issues

Session Management Issues

Session Management Issues: A session represents the connection that a client has with the server application. The session information that is maintained between the client and the server is important and can give an attacker access to confidential information if compromised. Ideally, a session will have a unique identifier, encryption, …

Read More »