Home / Jahanzaib Khan (page 5)

Jahanzaib Khan

Jahanzaib Khan is Web Designer & Ethical Hacker. He Who has been working since 2014, and is managing several successful websites on the internet for about 3 years. Jahanzaib-khan.com

“Zip Slip” A Critical Vulnerability Exploited in Zip

“Zip Slip” A Critical Vulnerability Exploited in Zip

Zip Vulnerability: A critical vulnerability has been discovered by the security researchers which are impacting many open source coding libraries. The vulnerability is discovered in the Synk, the “Zip Slip” this vulnerability has occurred due to the way coders implement the libraries and plug-ins when decompressing an archive file. Many …

Read More »

Cross Site Scripting

Cross Site Scripting

Cross-Site Scripting (XSS) is a type of attack that can occur in many forms, but in general they occur when data of some type enters a web application through an untrusted source (in the major of cases, a web request). Typically, this data is included as part of dynamic content …

Read More »

MyHeritage Breach Leaks Million of Account Details

MyHeritage Breach Leaks Million of Account Details

MyHeritage Data Breach over 92 Million Users Data Leaked: Over 92 million account details from the Genealogy and DNA Testing Service the MyHeritage were found on a private server, according to a release which was made by the company on Monday. According to the release of the report, the breach …

Read More »

File Systems

File Systems

File Systems: Several filesystems are involved in the operating systems, and from a network perspective, they have a high level of interoperability among them. Throughout the years, different vendors have implemented their own sets of file standards. Some of the more common filesystems in Windows are listed here: Microsoft FAT: …

Read More »

Contents of a Contract – PTES

Contents of a Contract – Penetration Testing

Contents of a Contract Penetration Testing: When the initial meeting is conducted, a contract will be generated outlining the objectives and parameters of the test. Read: Intelligence Gathering – PTES Let me give you a rough idea of some of the items that may be included: System to Be Evaluated …

Read More »

Monitoring System Logs

Monitoring System Logs

Monitoring System Logs: In addition to network monitoring, you must monitor the event logs. Event Logs are system logs that record various events that occur. Event logs comprise a broad category that includes some logs that are not relevant to security issue. But within that broad category are security and …

Read More »

Types of Hardware Tools

Types of Hardware Tools

Hardware Tools: So which hardware-based tools should you become fluent with or concentrate on when testing or training? Becoming familiar with the following tools should help you prepare for the CEH exam. Read: Installing Software Tools and Virtualized Operating System Minipwner: Available at www.minipwner.com, this multipurpose tool is about the …

Read More »

Installing Software Tools and Virtualized Operating System

Installing Software Tools and Virtualized Operating System

Installing a Virtualized Operating System: The next step in preparing the lab system is to install your virtual machines and configure them. Since I do not know which virtualization software you will choose, I will provide some broad steps on how the process works. You will need to research the …

Read More »

Application Security

Application Security

The Application Security: There are a number of issues to be cognizant of when it comes to application security.  Many of these have been addressed—or will be addressed—in other posts where discussion is more relevant, but the following is a list of those issues that CompTIA wants you to be …

Read More »

How to Figure out If Hackers Leaked Your Password

How to Figure out If Hackers Leaked Your Password

Figure out If Hackers Leaked Your Password: The passwords are on daily basis leaked onto the dark web, which is putting your online accounts and identity at risk. There are several types of tools & techniques that can help you figure out that your own details have been compromised by …

Read More »