November, 2017

  • 9 November

    Session Hijacking and Web Apps

    Session Hijacking and Web Apps: Session hijacking at the application level focuses on gaining access to a host by obtaining legitimate session IDs from the victim. Essentially, a session ID is an identifier the “conversation” it is having with the client. So, for example, say that you have logged in …

  • 8 November

    Ethics and The Law

    Ethics and The Law: As an ethical hacker, you need to be aware of the law and how it affects what you do. Ignorance or lack of understanding of the law not only is a bad idea but can quickly put you out of business—or even in prison. In fact, …

  • 7 November

    Understanding Hashing

    Understanding Hashing Simply yet, hashing can be considered a type of one-way encryption. Most accurately, it is a process that creates a scrambled output that cannot be reversed—or at least cannot be reversed easily. The process of hashing takes plain text and transforms it into cipher text but does so …

  • 6 November

    The Robots.txt File

    The Robots.txt File One way to begin understanding what’s running on a web server is to view the server’s robots.txt file. The robots.txt file is a listing of the directories and files on a web server that the owner wants web crawlers to omit from the indexing process. A web …

  • 5 November

    JTR: KING OF THE PASSWORD CRACKERS

    JTR: KING OF THE PASSWORD CRACKERS: It is hard to imagine discussing a topic like the basics of hacking without discussing passwords and password cracking. No matter what we do or how far we advance, it appears that passwords remain the most popular way to protect data and allow access …

  • 4 November

    Password Cracking Techniques

    Password-Cracking Techniques Popular culture would have us believe that cracking password is a simple as running some software and tapping a few buttons. The reality is that special techniques are needed to recover passwords. For the most part, we can break these techniques into categories; let’s take a high-level look …

  • 3 November

    Cyber Security Enhancement Act of 2002 – CSEA

    Cyber Security Enhancement Act of 2002 – CSEA Several years ago, Congress determined that the legal system still allowed for too much leeway for certain types of computer crimes and that some activities not labeled “illegal” needed to be. In July 2002, the House of Representatives voted to put stricter …

  • 2 November

    Plagiarism Checker X Pro – Life Time Activated Software | Best For Bloggers, Students & Teachers

    Plagiarism Checker X Pro – Life Time Activated In simple words, Plagiarism Checker X Pro is software which you can actually install on your PC/Laptop and use it to find out how many words are plagiarized means how many of the words or sentences have you copied from another person …

  • 2 November

    Hunting Cross-Site Scripting (XSS)

    Hunting Cross-Site Scripting (XSS) If you are not familiar with XSS attacks, make sure you read the OWASP article “Cross Site Scripting (XSS)” at http://tinyurl.com/3hl5rxt. Here are the main points you need to know about XSS: XSS is a client-side attack executed in the browser. JavaScript and VBScript are the …

  • 1 November

    Social Engineering: The Art of Hacking Humans

     What is Social Engineering? Social Engineering is a term that is widely used but poorly understood. It’s generally defined as any type of attack that is nontechnical in nature and that involves some type of human interaction with the goal of trying to trick or coerce a victim into revealing …