Wednesday , August 22 2018
Home / Web Hacking

Web Hacking

Security of Server Rooms and Network

Security of Server Rooms and Network

Server Rooms and Network: Something that also needs to be included in this discussion is protecting server room. Since these rooms contain the living, breathing heart of your network, they require increased levels of protection. This security must be robust and carefully considered because an intruder in these areas can …

Read More »

Firewall Configuration in Network Security

Firewall Configuration

Firewall Configuration: Not all firewalls or firewall setups are created equally, so you need to be familiar with each setup and how it works. Firewalls can be set up and arranged in several ways, each offering its own advantages and disadvantages. In this section we will cover each method. Bastion …

Read More »

Encryption Weaknesses

Encryption Weaknesses

Encryption Weaknesses: In web application, encryption plays a vital role because sensitive information is frequently exchanged between client and server in the form of logons or other types of information. When securing web applications, you must consider the safety of information at two stages: when it is stored and when …

Read More »

Scripting Errors

Scripting Errors

Scripting Errors: Web applications, programs, and code such as Common Gateway Interface (CGI), ASP.NET and JavaServer Pages (JSP) are commonly in use in web applications and present their own issues. Vulnerabilities such as a lack of input validation scripts can be a liability. A savvy hacker can use a number …

Read More »

Apache Web Server

Apache Web Server

Apache Web Server: Apache web server is the most popular technology of its type in the world with an estimated 60 percent of web servers on the Internet running the software (62 percent with server derived from Apache included). While it was originally developed for the Unix platform back in …

Read More »

The PsTools Suite

The PsTools Suite

PsTools Suite: Standing tall next to our other tools is a suite of Microsoft tools designed to extract various kinds of information and perform other tasks involving a system. The tools in the PsTools suite allow you to manage remote systems as well as the local system. NOTE: You can …

Read More »

Testing Web Applications

Testing Web Applications

Testing Web Applications: Since web applications are complex, the use of specialized software to analyze or test an application may be necessary. Some of these software packages are included here. Burp Suite Burp Suite is a Java-based application used to test and attack web application. Upon closer inspection the software …

Read More »

Closer Inspection of a Web Application

Closer Inspection of a Web Application

Web Application: Web application is designed to run on web servers and send their output over the Internet. Let’s examine the running of such applications in their environment. You can visualize a web application as consisting of not only a client and server but also layers. These layers are as …

Read More »

Terminology in Footprinting

Terminology in Footprinting

Terminology in Footprinting: In this section you will learn definitions that may appear on the CEH v10 (Certified Ethical Hacking) exam.   Open Source and Passive Information Gathering As far as intelligence gathering goes, open source or passive information gathering is the least aggressive, basically, the process relies on obtaining …

Read More »

Secure Sockets Layer

Secure Sockets Layer

Secure Sockets Layer: Another important mechanism for securing information is Secure Sockets Layer (SSL). The SSL protocol was developed by Netscape in the mid-1990s and rapidly became a standard mechanism for exchanging data securely over insecure channels such as the Internet. NOTE: SSL is supported by all modern browsers and …

Read More »