Wednesday , August 22 2018

March, 2018

  • 5 March

    Noteworthy HTTP Headers

    Noteworthy HTTP Headers

    Noteworthy HTTP Headers: Each HTTP cycle also includes headers in both the client request and the server response that transmit details about the request or response. There are several of these headers, but we are only concerned with a few that are most applicable to our approach covered in this …

  • 4 March

    Noteworthy HTTP Status Codes

    Noteworthy HTTP Status Codes

    HTTP Status Codes: As web server responses are received by your browser, they will include a status code to signal what type of response it is. There are over 50 numerical HTTP responses codes grouped into five families that provide similar type of status codes. Knowing what each type of …

  • 3 March

    The Early Days of Hacking

    The Early Days of Hacking

    The Early Days of Hacking: The idea of hacking and hackers goes way back to the first technologies enthusiastic that wanted to learn about new technology and were curious about how it worked. They were the same types of people who today are interested not only in acquiring all sorts …

  • 2 March

    Bluetooth Threats

    Bluetooth Threats

    Bluetooth Threats: Much like Wi-Fi, Bluetooth has a bevy of threats facing it that you must take into account. Bluetooth suffers from many shortcomings that have been slowly addressed with each successive version, but many flaws remain and can be exploited. The technology has already seen many attacks take their …

  • 1 March

    Hacking Bluetooth

    Hacking Bluetooth

    Hacking Bluetooth: Another wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to a short-range wireless technology commonly used to connect devices such as headsets, media players, and other types of technologies. Bluetooth operates in the 2.4 GHz frequency range and …

February, 2018

  • 28 February

    Working with Email

    Working with Email

    Working with Email: Email is one of the tools that a business relies on today to get its mission done. Without email many businesses would have serious trouble functioning in anything approaching a normal manner. The contents of email are staggering and can be extremely valuable to an attacker looking …

  • 27 February

    The Value of Job Sites

    The Value of Job Sites

    The Value of Job Sites: An oft-overlooked but valuable method of gathering information about a target is through job sites and job postings. If you have every looked at a job posting, as many of us have, you will notice that they can take a lot of forms, but something …

  • 26 February

    Using a Honeypot in Practice

    Using a Honeypot in Practice

    Honeypot in Practice: A honeypot is ideally suited to get a clearer picture of the activity on or around the critical systems in your environment. The common use of honeypots is to look like a legitimate resource so as to be indistinguishable from the real thing. This will subject both …

  • 25 February

    Biometrics: Installing Biometric Devices

    Biometrics: Installing Biometric Devices

    Biometrics: Biometrics systems use some kind of unique biological trait to identify a person, such as fingerprint, patterns on the retina, and handprints. Some methods that are used include hand scanners, retinal scanners, facial recognition applications, and keystroke recognition programs, which can be used as part of the access control …

  • 24 February

    Directory Traversal/Command Injection

    Directory Traversal Command Injection

    Directory Traversal and Command Injection: If an attacker is able to gain access to restricted directories (such as the root directory) through HTTP, it is known as a directory traversal attack. If the attackers can gain access to the root directory of a system (which is limited from all but …